<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CyberMaterial: Alerts]]></title><description><![CDATA[Find the latest cybersecurity alerts from patches, and updates to newest threat actors.]]></description><link>https://www.cybermaterial.com/s/alerts</link><image><url>https://substackcdn.com/image/fetch/$s_!nNgF!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6c57d21-5644-4f88-bf07-ea44d2603e80_482x482.png</url><title>CyberMaterial: Alerts</title><link>https://www.cybermaterial.com/s/alerts</link></image><generator>Substack</generator><lastBuildDate>Mon, 04 May 2026 13:29:14 GMT</lastBuildDate><atom:link href="https://www.cybermaterial.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[CyberMaterial]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybermaterial@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybermaterial@substack.com]]></itunes:email><itunes:name><![CDATA[CyberMaterial]]></itunes:name></itunes:owner><itunes:author><![CDATA[CyberMaterial]]></itunes:author><googleplay:owner><![CDATA[cybermaterial@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybermaterial@substack.com]]></googleplay:email><googleplay:author><![CDATA[CyberMaterial]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Cybercrime Syndicates Exploit Vishing and SSO Vulnerabilities for High-Speed Cloud Extortion ]]></title><description><![CDATA[The evolution of these tactics marks a significant shift in the cybercrime landscape, as threat actors move away from slow, malware-heavy infections toward agile, identity-based intrusions.]]></description><link>https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing</guid><pubDate>Mon, 04 May 2026 12:27:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!R-G_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R-G_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R-G_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R-G_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f638de62-e912-4520-996a-e05869af4cb7_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:446144,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196414582?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!R-G_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!R-G_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff638de62-e912-4520-996a-e05869af4cb7_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The evolution of these tactics marks a significant shift in the cybercrime landscape, as threat actors move away from slow, malware-heavy infections toward agile, identity-based intrusions. By targeting administrative accounts within Single Sign-On platforms, attackers can gain broad access to sensitive data stored across various cloud services, often completing their data theft and extortion demands within hours of the initial breach.<br><br>The initial phase of these attacks typically begins with a high-pressure voice phishing call, often referred to as vishing. In these scenarios, a threat actor poses as a member of the corporate IT help desk or security team, contacting a specific employee to report a fabricated technical issue. The goal is to convince the target to share their login credentials or to accept a push notification on their authentication app. Because these calls rely on social engineering and psychological manipulation rather than malicious software, they frequently bypass automated security filters that look for suspicious code or links.<br><br>Once the attackers gain entry into the corporate environment, they immediately target the Single Sign-On or SSO provider. SSO is designed to streamline user access by allowing one set of credentials to unlock multiple applications, but in the hands of a criminal, it becomes a master key. By abusing SSO configurations, the intruders can grant themselves persistent access to a wide array of Software-as-a-Service platforms, such as document storage, customer databases, and communication tools like Slack or Microsoft Teams. This centralized control allows them to navigate the network with the same privileges as a legitimate administrator.<br><br>After securing access to the various SaaS platforms, the group focuses on rapid data exfiltration rather than deploying ransomware to encrypt files. They identify the most sensitive corporate data&#8212;financial records, legal documents, or customer personal information&#8212;and transfer it to their own servers. The speed of this process is a defining characteristic of modern extortion groups; they aim to steal as much information as possible before the internal security team can detect the anomaly. By the time an alert is triggered, the data has often already left the company's control.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The extortion phase begins shortly after the data has been stolen. Instead of leaving a digital ransom note on a server, the attackers often contact company executives directly via email or even phone calls to demand payment. They threaten to leak the stolen data on public forums or sell it to competitors if their demands are not met. Because the attackers have already demonstrated their ability to move through the cloud environment at will, the pressure on the victim organization to pay is immense, as the threat of a massive data breach becomes an immediate reality.<br><br>Defending against these rapid-fire attacks requires a move beyond traditional antivirus software toward robust identity security and employee awareness. Organizations are being urged to implement more secure forms of multi-factor authentication, such as hardware keys, which are much harder to compromise through vishing. Additionally, monitoring for unusual behavior within SSO logs, such as logins from unexpected locations or at odd hours, is essential for catching these intruders before they can complete their mission. As cybercrime groups continue to refine their social engineering and cloud exploitation techniques, the speed of response has become the most critical factor in modern digital defense.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>: https://www.crowdstrike.com/en-us/blog/defending-against-cordial-spider-and-snarky-spider-with-falcon-shield/ </p>]]></content:encoded></item><item><title><![CDATA[CISA Adds Major Linux Kernel Vulnerability to Known Exploited Vulnerabilities Catalog]]></title><description><![CDATA[The Cybersecurity and Infrastructure Security Agency recently expanded its Known Exploited Vulnerabilities catalog to include CVE-2026-31431, a logic flaw in the Linux kernel&#8217;s cryptographic template.]]></description><link>https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability</link><guid isPermaLink="false">https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability</guid><pubDate>Mon, 04 May 2026 12:25:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!v2kH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v2kH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v2kH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v2kH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:530219,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196414267?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!v2kH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!v2kH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1653392-b8ef-4bf2-be59-6f021cf3f87b_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The Cybersecurity and Infrastructure Security Agency recently expanded its Known Exploited Vulnerabilities catalog to include CVE-2026-31431, a logic flaw in the Linux kernel&#8217;s cryptographic template. This vulnerability, discovered by researchers at Xint Code, affects a wide range of popular distributions including Ubuntu, Red Hat Enterprise Linux, SUSE, and Amazon Linux. The flaw is particularly dangerous because it allows a local user to execute a deterministic 4-byte write into the page cache of any readable file, which can lead to a full system takeover. Because the exploit targets memory rather than the physical disk, the changes are silent and difficult for traditional security tools to detect.<br><br>The technical root of the issue lies in the interaction between the kernel's crypto subsystem and the splice system call. By using an unprivileged AF_ALG socket, an attacker can map sensitive file pages into a cryptographic operation. A specific error in the authencesn algorithm causes the kernel to use the output buffer as a scratch space, inadvertently writing controlled data past the intended boundary. This extra write lands directly in the page cache of a chosen file, such as a setuid-root binary. Because the kernel does not mark these corrupted pages as dirty, the file on the disk remains original while the version running in memory is compromised.<br><br>To carry out the attack, an operator uses a small script to target a common binary like the su utility. After binding to the vulnerable cryptographic mode and setting the parameters, the attacker uses the recv system call to trigger the decryption process. This process repeats until enough shellcode has been injected into the cached version of the binary. When the attacker subsequently executes the utility, the kernel loads the corrupted code from the cache. Since the utility naturally runs with root privileges, the injected code provides the attacker with total control over the operating system.<br><br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Research shows that this vulnerability has been present in the Linux kernel since an optimization made in 2017. It is highly portable and effective across different architectures, making it a more reliable threat than previous kernel exploits like Dirty Cow. The simplicity of the exploit is a major concern, as a script under one kilobyte in size can consistently achieve root access on modern systems such as Ubuntu 24.04 or RHEL 10.1. Furthermore, because it exploits the shared page cache, the vulnerability can be used to escape Kubernetes containers and move laterally within cloud environments.<br><br>In response to the active exploitation of this flaw, CISA has issued a directive requiring federal agencies to remediate the vulnerability by May 15, 2026. While the mandate specifically applies to Federal Civilian Executive Branch agencies, cybersecurity experts strongly advise private organizations to prioritize patching their Linux infrastructure. Most major distributions have released updates to address the logic bug in the cryptographic subsystem, and administrators are encouraged to apply these kernel patches immediately to prevent unauthorized privilege escalation.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>: https://www.cisa.gov/news-events/alerts/2026/05/01/cisa-adds-one-known-exploited-vulnerability-catalog </p>]]></content:encoded></item><item><title><![CDATA[PayPal Emails Hijacked for Tech Support Scams]]></title><description><![CDATA[Scammers have discovered a new method to exploit PayPal's email system, sending fraudulent messages that appear to be legitimate notifications from PayPal.]]></description><link>https://www.cybermaterial.com/p/paypal-emails-hijacked-for-tech-support</link><guid isPermaLink="false">https://www.cybermaterial.com/p/paypal-emails-hijacked-for-tech-support</guid><pubDate>Fri, 01 May 2026 12:10:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7X1p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7X1p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7X1p!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!7X1p!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!7X1p!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!7X1p!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7X1p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:181091,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196105807?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7X1p!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!7X1p!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!7X1p!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!7X1p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dde3228-694d-4a42-923c-ef82eb7c1a10_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Scammers have discovered a new method to exploit PayPal's email system, sending fraudulent messages that appear to be legitimate notifications from PayPal. These emails, which are not spoofed and pass standard security checks, are designed to deceive recipients into believing there is an unauthorized charge on their account. The scam involves altering the subject line of PayPal payment notifications to include a fake tech support number, urging recipients to call and resolve the supposed issue.<br><br>The scam works by sending emails from PayPal's genuine address, service@paypal.com, with a misleading subject line that suggests a pending charge of $987.90. The body of the email, however, shows a trivial transaction amount, creating confusion and urgency for the recipient. The scammers include personalized details such as the recipient's name and a real transaction ID to enhance the email's authenticity. The phone number provided in the subject line is fake, while the legitimate PayPal contact number is buried within the email body.<br><br>The technical mechanism behind the altered subject line remains unclear. It is suspected that scammers may be exploiting PayPal's note or remittance field, which can appear in certain payout templates, including the email's subject line. This manipulation allows the scam email to pass security checks like DKIM, SPF, and DMARC, making it appear as a genuine PayPal communication.<br><br>The impact of this scam is significant, as it can lead to victims inadvertently providing sensitive information to scammers. Once contacted, these scammers may attempt to collect banking details, convince victims to install remote access tools, or gain control over their accounts and devices. This can result in financial loss and unauthorized access to personal information.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>To protect against such scams, it is essential to stay informed about common phishing tactics and recognize red flags in suspicious emails. Always use verified contact methods to reach companies and avoid calling numbers listed in dubious emails. Report any suspicious PayPal emails to phishing@paypal.com and monitor your accounts for unusual activity. If you suspect you have been scammed, take immediate action by contacting your bank, changing compromised passwords, and running security scans on your devices. Utilizing tools like Malwarebytes Scam Guard can also help identify and prevent potential scams.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>: https://www.malwarebytes.com/blog/news/2026/04/more-paypal-emails-hijacked-to-deliver-tech-support-scams</p>]]></content:encoded></item><item><title><![CDATA[High-Risk AI Browser Extensions Exposed]]></title><description><![CDATA[Unit 42 has recently uncovered a significant threat posed by certain AI browser extensions.]]></description><link>https://www.cybermaterial.com/p/high-risk-ai-browser-extensions-exposed</link><guid isPermaLink="false">https://www.cybermaterial.com/p/high-risk-ai-browser-extensions-exposed</guid><pubDate>Fri, 01 May 2026 12:09:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Y6GT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Y6GT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y6GT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Y6GT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Y6GT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Y6GT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y6GT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:520346,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/196105698?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Y6GT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Y6GT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Y6GT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Y6GT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d1fa4e-c2b0-4ca5-8dae-184a96b6634c_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Unit 42 has recently uncovered a significant threat posed by certain AI browser extensions. These extensions, which are often marketed as productivity tools, have been found to engage in malicious activities such as data theft, prompt interception, and password exfiltration. This discovery highlights the growing risks associated with seemingly benign software that users integrate into their daily digital routines.<br><br>The extensions in question are cleverly disguised, making them appear as useful tools for enhancing productivity. However, beneath this facade, they are designed to capture sensitive information from users. This includes intercepting prompts and exfiltrating passwords, which can lead to severe privacy breaches and potential financial loss for unsuspecting users.<br><br>Technically, these extensions operate by embedding themselves within the browser environment, where they gain access to a wide range of user data. Once installed, they can monitor user activity, capture keystrokes, and transmit collected information to external servers. This level of access allows them to bypass traditional security measures, making detection and prevention more challenging.<br><br>The impact of these malicious extensions is far-reaching, affecting both individual users and organizations. Personal data, including login credentials and sensitive communications, can be compromised, leading to identity theft and unauthorized access to accounts. For businesses, the risk extends to corporate data breaches and potential regulatory violations.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>To mitigate these risks, users are advised to exercise caution when installing browser extensions. It is essential to verify the legitimacy of extensions by checking reviews and permissions before installation. Regularly reviewing and updating browser settings can also help in identifying and removing any suspicious extensions. Additionally, employing robust security software can provide an extra layer of protection against such threats.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://unit42.paloaltonetworks.com/high-risk-gen-ai-browser-extensions/</p>]]></content:encoded></item><item><title><![CDATA[PromptMink Malware Targets Crypto Trading Agents]]></title><description><![CDATA[A sophisticated malware campaign known as PromptMink has emerged, targeting the software development community, particularly those involved with autonomous crypto trading projects.]]></description><link>https://www.cybermaterial.com/p/promptmink-malware-targets-crypto</link><guid isPermaLink="false">https://www.cybermaterial.com/p/promptmink-malware-targets-crypto</guid><pubDate>Thu, 30 Apr 2026 12:26:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EiPN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EiPN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EiPN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!EiPN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!EiPN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!EiPN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EiPN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:678709,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195991303?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EiPN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!EiPN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!EiPN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!EiPN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cc2e2f3-36bf-42a1-b99c-fb83aa49c5e8_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A sophisticated malware campaign known as PromptMink has emerged, targeting the software development community, particularly those involved with autonomous crypto trading projects. This campaign exploits AI coding assistants to introduce malicious code into legitimate projects, marking a new tactic in cybercriminal activities. The attack was first identified when a malicious npm package was introduced into a crypto trading agent project through a code commit co-authored by an AI model from Anthropic.<br><br>The attack began on February 28, 2026, with a commit to the open-source project openpaw-graveyard. This commit added a seemingly benign package, @solana-launchpad/sdk, which in turn imported a malicious package, @validate-sdk/v2. The latter masquerades as a data validation tool while secretly collecting sensitive credentials and sending them to a remote server controlled by attackers. This method of using AI tools to plant harmful code represents a significant shift in cybercriminal strategies.<br><br>ReversingLabs researchers were the first to uncover this campaign, which they named PromptMink. Their investigation revealed that the campaign is linked to the North Korean threat group Famous Chollima, known for previous attacks on software developers. The campaign uses a two-layer structure to evade detection, with the first layer appearing legitimate and the second containing the harmful code. Over 60 unique malicious packages have been identified, with no signs of the campaign ceasing.<br><br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The malware&#8217;s payload is designed to scan for sensitive files related to cryptocurrency transactions and exfiltrate them to an attacker-controlled server. On Linux systems, it also creates a persistent backdoor by adding the attacker&#8217;s SSH key to the victim&#8217;s machine. The campaign has evolved to include versions written in Rust, capable of stealing entire project directories, indicating a focus on intellectual property theft.<br><br>To mitigate the risk of such attacks, developers and security teams should thoroughly review AI-generated code commits and verify all new dependencies through trusted sources. Monitoring for unusual network activity and auditing SSH authorized keys files are also recommended practices to detect and prevent unauthorized access. These measures are essential to safeguarding development environments from sophisticated supply chain attacks like PromptMink.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://cybersecuritynews.com/claude-generated-commit-adds-promptmink-malware/ </p>]]></content:encoded></item><item><title><![CDATA[Vidar Rises to Top of Chaotic Infostealer Market]]></title><description><![CDATA[Vidar, a credential-stealing malware that has been active since 2018, has recently ascended to the top of the infostealer market.]]></description><link>https://www.cybermaterial.com/p/vidar-rises-to-top-of-chaotic-infostealer</link><guid isPermaLink="false">https://www.cybermaterial.com/p/vidar-rises-to-top-of-chaotic-infostealer</guid><pubDate>Thu, 30 Apr 2026 12:22:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!s6Vh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s6Vh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s6Vh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!s6Vh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!s6Vh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!s6Vh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s6Vh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/597e51cf-4467-41b4-8f97-623e06235263_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:373228,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195988310?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s6Vh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!s6Vh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!s6Vh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!s6Vh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F597e51cf-4467-41b4-8f97-623e06235263_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Vidar, a credential-stealing malware that has been active since 2018, has recently ascended to the top of the infostealer market. This rise follows the takedown of its two major competitors, Lumma and Rhadamanthys, by law enforcement last year. Vidar's author capitalized on this disruption by releasing a significant upgrade and expanding its distribution network, making it a favored choice among cybercriminals, according to a report by Intrinsec.<br><br>The report from Intrinsec highlights Vidar's dominance on the Russian Market, a prominent cybercrime marketplace, since late 2025. The malware has become a go-to tool for various threat actors, including high-profile groups like Scattered Spider. Vidar's broad-spectrum capabilities allow it to harvest a wide range of sensitive data, such as passwords, cookies, and session tokens from major web browsers, as well as cryptocurrency wallet information. This data is often sold on underground marketplaces, enabling further malicious activities like account takeovers and ransomware deployment.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Vidar&#8217;s distribution methods are diverse, with attackers employing phishing emails, social engineering tactics on platforms like YouTube, and Trojanized software packages to spread the malware. A notable strategy involves collaboration with &#8216;Cloud&#8217; channels on Telegram, where cybercriminals share stolen credential logs. These channels, with names like Kata Cloud and Omega Cloud, have significantly contributed to Vidar&#8217;s popularity by advertising its capabilities to potential clients.<br><br>The malware&#8217;s infrastructure is designed to withstand takedown attempts. Vidar uses &#8216;dead drop resolvers&#8217; to conceal its command-and-control (C2) systems, embedding C2 addresses within legitimate public platforms like Telegram. This method allows the malware to dynamically retrieve C2 details, making it difficult for defenders to detect and block its communications.<br><br>To defend against Vidar, Intrinsec recommends several measures. Organizations should enable multifactor authentication for accounts related to web browsers to reduce the risk of credential theft. Additionally, deploying DNS filtering and secure web gateways can help block access to known malicious domains and IP addresses. Using sandbox solutions to analyze email attachments and URLs can further enhance protection against this pervasive threat.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://www.darkreading.com/vulnerabilities-threats/vidar-top-chaotic-infostealer-market </p>]]></content:encoded></item><item><title><![CDATA[GitHub fixes critical remote code execution flaw]]></title><description><![CDATA[GitHub swiftly addressed a critical security vulnerability in their internal git infrastructure that could have led to remote code execution.]]></description><link>https://www.cybermaterial.com/p/github-fixes-critical-remote-code</link><guid isPermaLink="false">https://www.cybermaterial.com/p/github-fixes-critical-remote-code</guid><pubDate>Wed, 29 Apr 2026 12:13:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Hait!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hait!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hait!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Hait!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Hait!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Hait!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hait!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:185596,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195862550?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hait!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Hait!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Hait!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Hait!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01cbcf6b-2979-4da0-938a-b4869460d482_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>GitHub swiftly addressed a critical security vulnerability in their internal git infrastructure that could have led to remote code execution. The flaw was discovered by Wiz Research, who utilized AI models to identify the potential threat. This vulnerability posed a significant risk as it could have allowed attackers to access millions of public and private code repositories hosted on GitHub's platform.<br><br>Upon receiving the bug bounty report, GitHub's security team acted promptly to validate the findings. Within 40 minutes, they managed to reproduce the vulnerability internally and confirmed its severity. This rapid response was crucial in mitigating the risk associated with the vulnerability.<br><br>The technical details of the vulnerability have not been disclosed, but it was significant enough to warrant immediate attention from GitHub's engineering team. They worked diligently to develop and deploy a fix in less than six hours, showcasing their commitment to maintaining the security of their platform.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The impact of this vulnerability could have been severe, potentially exposing millions of code repositories to unauthorized access. Such access could have led to data breaches or manipulation of code, affecting both individual developers and organizations relying on GitHub for their software development needs.<br><br>To ensure continued security, users are encouraged to stay informed about updates from GitHub and apply any recommended security measures. GitHub&#8217;s quick response highlights the importance of having robust security protocols and a responsive team to address vulnerabilities as they arise.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854</p>]]></content:encoded></item><item><title><![CDATA[Critical Flaw in Vect Ransomware]]></title><description><![CDATA[A significant flaw has been discovered in the Vect 2.0 ransomware, which causes it to wipe large files instead of encrypting them, rendering recovery impossible.]]></description><link>https://www.cybermaterial.com/p/critical-flaw-in-vect-ransomware</link><guid isPermaLink="false">https://www.cybermaterial.com/p/critical-flaw-in-vect-ransomware</guid><pubDate>Wed, 29 Apr 2026 12:11:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zeTA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zeTA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zeTA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!zeTA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!zeTA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!zeTA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zeTA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:287017,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195862322?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zeTA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!zeTA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!zeTA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!zeTA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe361e0c0-4568-4f18-8036-77c92a0125ca_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A significant flaw has been discovered in the Vect 2.0 ransomware, which causes it to wipe large files instead of encrypting them, rendering recovery impossible. This flaw was identified by Check Point Research during an investigation into the latest version of the ransomware. Vect is a ransomware-as-a-service (RaaS) program that has been active since December 2025 and has gained notoriety through partnerships with other cybercriminal groups.<br><br>Vect 2.0 was launched in February 2026 and is written in C++, supporting Windows, Linux, and VMware ESXi systems. The ransomware was allegedly built from scratch and includes features such as cloud lockers targeting various cloud storage services. However, the encryption implementation contains a critical flaw that discards three out of four decryption nonces, leading to the permanent destruction of files larger than 128 KB.<br><br>The encryption system uses raw ChaCha20-IETF without authentication, contrary to the advertised ChaCha20-Poly1305 AEAD. This lack of integrity protection effectively turns Vect into a wiper for files containing important data, including virtual machine disks, databases, and backups. The flaw is present across all publicly available versions of Vect and affects all targeted platforms.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Check Point Research also identified several additional bugs and design failures in Vect 2.0, such as ineffective string obfuscation and a thread scheduler that degrades performance. Despite its ambitious threat profile and multi-platform coverage, the technical implementation of Vect 2.0 falls short of its claims.<br><br>Organizations using Windows, Linux, or VMware ESXi systems should ensure their security measures are up to date to protect against ransomware threats. It is advisable to implement additional protective measures and regularly back up critical data to mitigate the impact of potential ransomware attacks.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://research.checkpoint.com/2026/vect-ransomware-by-design-wiper-by-accident/ </p>]]></content:encoded></item><item><title><![CDATA[Sandworm Uses SSH-over-Tor Tunnel]]></title><description><![CDATA[Sandworm, a state-sponsored threat group also known as FROZENBARENTS, has adopted a new technique involving SSH-over-Tor tunneling to maintain long-term, covert access to targeted networks.]]></description><link>https://www.cybermaterial.com/p/sandworm-uses-ssh-over-tor-tunnel</link><guid isPermaLink="false">https://www.cybermaterial.com/p/sandworm-uses-ssh-over-tor-tunnel</guid><pubDate>Tue, 28 Apr 2026 12:29:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!c874!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c874!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c874!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!c874!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!c874!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!c874!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c874!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1f49a64-d253-4853-b761-3a274fa6125c_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:553886,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195743124?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c874!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!c874!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!c874!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!c874!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1f49a64-d253-4853-b761-3a274fa6125c_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Sandworm, a state-sponsored threat group also known as FROZENBARENTS, has adopted a new technique involving SSH-over-Tor tunneling to maintain long-term, covert access to targeted networks. This development marks a significant evolution in their tradecraft, allowing them to remain undetected for extended periods. Sandworm has been active since 2014 and is known for targeting government bodies, energy firms, and research institutions, primarily for intelligence collection purposes.<br><br>The attack typically begins with spear-phishing, a common tactic used by threat actors to gain initial access to a network. Once inside, Sandworm employs SSH-over-Tor tunneling to establish a secure and anonymous communication channel. This method enables them to bypass traditional security measures and maintain persistence within the network without raising alarms.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>SSH-over-Tor tunneling combines the secure shell (SSH) protocol with the anonymity network Tor. This combination provides a double layer of security and anonymity, making it challenging for defenders to detect and trace the malicious activity back to its source. By using this technique, Sandworm can effectively hide their presence and activities from network monitoring tools.<br><br>The impact of this new tactic is significant, as it allows Sandworm to conduct prolonged espionage operations without detection. Organizations in the targeted sectors face increased risks of data breaches and intelligence theft, which can have severe consequences for national security and business operations.<br><br>To counter this threat, organizations should enhance their network monitoring capabilities and implement advanced security measures. This includes deploying intrusion detection systems, conducting regular security audits, and training employees to recognize spear-phishing attempts. By taking these steps, organizations can better protect themselves against sophisticated threats like those posed by Sandworm.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://gbhackers.com/ssh-over-tor-tunnel/</p>]]></content:encoded></item><item><title><![CDATA[Fake CAPTCHA scam leads to costly phone bills]]></title><description><![CDATA[A recent investigation by researchers has revealed a deceptive campaign that exploits fake CAPTCHA pages to trick mobile users into incurring hefty international SMS charges.]]></description><link>https://www.cybermaterial.com/p/fake-captcha-scam-leads-to-costly</link><guid isPermaLink="false">https://www.cybermaterial.com/p/fake-captcha-scam-leads-to-costly</guid><pubDate>Tue, 28 Apr 2026 12:27:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wuem!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wuem!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wuem!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!wuem!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!wuem!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!wuem!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wuem!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:344944,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195741674?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wuem!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!wuem!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!wuem!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!wuem!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9eca8c35-60ea-4d48-a0e3-f5e48252c204_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A recent investigation by researchers has revealed a deceptive campaign that exploits fake CAPTCHA pages to trick mobile users into incurring hefty international SMS charges. This scam, known as International Revenue Share Fraud (IRSF), takes advantage of the complex pricing structures of international calls and SMS traffic to generate revenue for cybercriminals without the need to install malware on the victim's device.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The scam operates by luring victims through malvertising or redirects from typosquatted telecom domains to a page mimicking a CAPTCHA. Instead of verifying the user as human, the page prompts them to send prefilled SMS messages to multiple international numbers. These numbers are strategically chosen from countries with high termination fees, such as Azerbaijan, Myanmar, and Egypt, resulting in significant charges on the victim&#8217;s phone bill.<br><br>To ensure victims remain trapped, the scam employs back-button hijacking techniques using JavaScript, which prevents users from easily leaving the page. The campaign is further supported by a Click2SMS-style affiliate network that promotes the scam as a monetization strategy for dubious publishers, defrauding both individuals and telecom carriers.<br><br>The impact on victims includes unexpected premium SMS charges and difficulties in tracing the source of these charges. Telecom carriers also suffer financial losses due to revenue-sharing agreements with the perpetrators and potential chargebacks from customer disputes.<br><br>To protect against such scams, users should never send SMS messages to verify CAPTCHAs, as legitimate CAPTCHAs do not require such actions. Regularly reviewing mobile bills for unfamiliar charges and disputing them promptly is advised. Additionally, users can enhance their security by using mobile protection apps that block known malicious sites associated with these scams.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://www.malwarebytes.com/blog/news/2026/04/fake-captcha-scam-turns-a-quick-click-into-a-costly-phone-bill</p>]]></content:encoded></item><item><title><![CDATA[Phishing Campaign Targeting Robinhood Users]]></title><description><![CDATA[A new phishing campaign has been identified targeting users of the financial services platform Robinhood.]]></description><link>https://www.cybermaterial.com/p/phishing-campaign-targeting-robinhood</link><guid isPermaLink="false">https://www.cybermaterial.com/p/phishing-campaign-targeting-robinhood</guid><pubDate>Mon, 27 Apr 2026 12:40:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!k6fE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k6fE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k6fE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!k6fE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!k6fE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!k6fE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k6fE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:195918,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195621931?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k6fE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!k6fE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!k6fE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!k6fE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee9b99e1-0a2c-47cf-be9e-ad44f4fd39a0_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A new phishing campaign has been identified targeting users of the financial services platform Robinhood. Ripple's former Chief Technology Officer, David Schwartz, has issued a warning about this threat, which is exploiting users through emails that mimic official Robinhood communications. This campaign is particularly concerning as it coincides with the period leading up to Robinhood's earnings report, a time when users may be more susceptible to such scams due to increased communication from the company.<br><br>The phishing emails are crafted to appear as though they are legitimate messages from Robinhood, making it challenging for users to distinguish them from genuine communications. These emails may include links or attachments that, when interacted with, could lead to the compromise of sensitive personal information. The attackers are leveraging the timing of Robinhood's earnings report to increase the likelihood of users engaging with these fraudulent emails.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Technically, the phishing emails are designed to bypass common email security filters by closely mimicking the appearance and language of official Robinhood correspondence. This includes using similar email addresses, logos, and formatting to deceive recipients. Such tactics are a common method used by cybercriminals to gain trust and prompt users to take actions that could compromise their accounts.<br><br>The impact of this phishing campaign could be significant, potentially leading to unauthorized access to users&#8217; financial accounts and personal data. If successful, attackers could exploit this information for financial gain or further identity theft. Robinhood users are at risk of losing funds or having their personal information exposed if they fall victim to this scam.<br><br>To protect themselves, Robinhood users should remain vigilant and skeptical of any unsolicited emails claiming to be from the company. It is advisable to verify the authenticity of any communication by contacting Robinhood directly through official channels. Users should avoid clicking on links or downloading attachments from suspicious emails and ensure their email security settings are up to date to help filter out potential phishing attempts.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  </p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/JoelKatz/status/2048623679316406371&quot;,&quot;full_text&quot;:&quot;WARNING: Any emails you get that appear to be from Robinhood (and may actually be from their email system) are phishing attempts.\n\nExample: &quot;,&quot;username&quot;:&quot;JoelKatz&quot;,&quot;name&quot;:&quot;David 'JoelKatz' Schwartz&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1972758602919428096/tFRw7C7s_normal.jpg&quot;,&quot;date&quot;:&quot;2026-04-27T04:42:01.000Z&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/HG4sVjnakAE8xmd.png&quot;,&quot;link_url&quot;:&quot;https://t.co/oJilpQqJdp&quot;}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:81,&quot;retweet_count&quot;:235,&quot;like_count&quot;:1091,&quot;impression_count&quot;:48048,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div>]]></content:encoded></item><item><title><![CDATA[Pack2TheRoot Linux Vulnerability]]></title><description><![CDATA[A newly discovered vulnerability, dubbed 'Pack2TheRoot', has been found in PackageKit, a widely used package management system in Linux environments.]]></description><link>https://www.cybermaterial.com/p/pack2theroot-linux-vulnerability</link><guid isPermaLink="false">https://www.cybermaterial.com/p/pack2theroot-linux-vulnerability</guid><pubDate>Mon, 27 Apr 2026 12:39:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uPfi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uPfi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uPfi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!uPfi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!uPfi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!uPfi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uPfi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:328791,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195621734?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uPfi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!uPfi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!uPfi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!uPfi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f9a63-7a43-45d3-81f4-54cc8e11bcc6_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A newly discovered vulnerability, dubbed 'Pack2TheRoot', has been found in PackageKit, a widely used package management system in Linux environments. This security flaw is particularly concerning as it allows unprivileged users to escalate their privileges to root level, posing a significant risk to system integrity and security.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The vulnerability arises from a race condition within PackageKit. Race conditions occur when a system&#8217;s behavior is dependent on the sequence or timing of uncontrollable events, leading to unpredictable outcomes. In this case, the flaw allows attackers to manipulate the package installation process, gaining unauthorized root access.<br><br>Technical details reveal that the issue is easily exploitable, making it a high-priority concern for systems running PackageKit. The vulnerability affects systems that rely on PackageKit for managing software packages, which includes a wide range of Linux distributions. The exploitability of this flaw means that attackers with minimal privileges can potentially gain full control over affected systems.<br><br>The impact of this vulnerability is significant, as gaining root access allows attackers to execute any command, modify system settings, and access sensitive data. This could lead to data breaches, system disruptions, and unauthorized access to critical infrastructure.<br><br>To protect against this vulnerability, users and administrators are advised to update their systems to the latest version of PackageKit, where the issue has been addressed. Regularly applying security patches and updates is essential to maintaining system security and protecting against potential exploits.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://www.securityweek.com/easily-exploitable-pack2theroot-linux-vulnerability-leads-to-root-access/</p>]]></content:encoded></item><item><title><![CDATA[Vidar Infostealer Spreads via Fake CAPTCHAs]]></title><description><![CDATA[A new variant of the Vidar infostealer malware is making rounds, employing deceptive tactics to infiltrate systems.]]></description><link>https://www.cybermaterial.com/p/vidar-infostealer-spreads-via-fake</link><guid isPermaLink="false">https://www.cybermaterial.com/p/vidar-infostealer-spreads-via-fake</guid><pubDate>Mon, 27 Apr 2026 12:36:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xJq4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xJq4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xJq4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!xJq4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!xJq4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!xJq4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xJq4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:239656,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195621616?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xJq4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!xJq4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!xJq4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!xJq4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45fa8f48-3e2d-4db3-89e1-d525c50fe2ed_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A new variant of the Vidar infostealer malware is making rounds, employing deceptive tactics to infiltrate systems. This version is distributed through fake CAPTCHA challenges, a method designed to trick users into downloading malicious files. Once the user interacts with these fake CAPTCHAs, the malware is delivered, often concealed within JPEG and TXT files.<br><br>Vidar infostealer is known for its ability to extract sensitive information from infected systems. This includes data from web browsers and cryptocurrency wallets, making it particularly dangerous for individuals who store financial information online. The malware's use of fileless attack techniques allows it to execute without leaving a trace on the hard drive, making detection more challenging.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The technical sophistication of Vidar&#8217;s latest iteration lies in its ability to hide within seemingly innocuous file types. By embedding itself in JPEG and TXT files, it bypasses traditional security measures that might not scrutinize these file types as rigorously. This method of delivery is part of a broader trend where cybercriminals use everyday file formats to mask their malicious activities.<br><br>The impact of this malware can be severe, especially for users who are unaware of the threat. Compromised browser data can lead to unauthorized access to online accounts, while stolen cryptocurrency wallet information can result in financial loss. The stealthy nature of fileless attacks further exacerbates the risk, as users may not realize their systems have been compromised until it&#8217;s too late.<br><br>To protect against this threat, users should be vigilant when encountering CAPTCHA prompts, especially those that appear unexpectedly. It&#8217;s advisable to keep security software updated to detect and block such malware. Additionally, users should regularly back up important data and consider using multi-factor authentication to secure online accounts.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>: https://hackread.com/vidar-infostealer-fake-captchas-jpeg-txt-files/ </p>]]></content:encoded></item><item><title><![CDATA[Fake CAPTCHA Scam Triggers SMS Fraud]]></title><description><![CDATA[Cybercriminals have devised a new method to exploit fake CAPTCHA pages, turning these routine security checks into a tool for international SMS fraud.]]></description><link>https://www.cybermaterial.com/p/fake-captcha-scam-triggers-sms-fraud</link><guid isPermaLink="false">https://www.cybermaterial.com/p/fake-captcha-scam-triggers-sms-fraud</guid><pubDate>Fri, 24 Apr 2026 12:44:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Z1vA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Z1vA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Z1vA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Z1vA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Z1vA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Z1vA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Z1vA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2b080f8-5bec-4e10-85d2-472598e91754_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:120552,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195343952?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Z1vA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!Z1vA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!Z1vA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Z1vA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2b080f8-5bec-4e10-85d2-472598e91754_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Cybercriminals have devised a new method to exploit fake CAPTCHA pages, turning these routine security checks into a tool for international SMS fraud. This scheme involves tricking users into participating in international revenue share fraud, a type of scam where attackers profit from inflated phone charges. The fraudulent activity is masked behind seemingly legitimate CAPTCHA requests, which users encounter during their online activities.<br><br>The attackers set up lookalike and scam domains that mimic legitimate websites. These domains are part of a traffic distribution system (TDS) that eventually leads victims to a fake CAPTCHA page. Once users interact with these pages, they unknowingly become part of the fraud scheme. The process is designed to be seamless, making it difficult for users to detect the scam until they notice unusual charges on their phone bills.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Technically, the scam operates by redirecting users through a series of web pages that culminate in the fake CAPTCHA. This redirection is orchestrated by the TDS, which is a network of compromised or malicious websites designed to funnel traffic to the scam pages. The fake CAPTCHA pages are crafted to look convincing, often indistinguishable from legitimate ones, which increases the likelihood of users falling victim to the scam.<br><br>The impact of this scam is significant, as it can lead to unexpected charges on victims&#8217; phone bills due to the international revenue share fraud mechanism. This type of fraud not only affects individual users but can also have broader implications for telecom companies and service providers, who may face increased customer complaints and potential financial losses.<br><br>To mitigate the risk of falling victim to this scam, users should exercise caution when encountering CAPTCHA requests, especially on unfamiliar websites. It is advisable to verify the legitimacy of a website before entering any personal information. Additionally, users should regularly monitor their phone bills for any unusual charges and report suspicious activity to their service providers immediately.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://www.infoblox.com/blog/threat-intelligence/hold-the-phone-international-revenue-share-fraud-driven-by-fake-captchas/</p>]]></content:encoded></item><item><title><![CDATA[Hackers Exploit PowerShell Script for Telegram Hijack]]></title><description><![CDATA[Cybercriminals are employing a novel method to hijack Telegram sessions by utilizing a PowerShell script hosted on Pastebin.]]></description><link>https://www.cybermaterial.com/p/hackers-exploit-powershell-script</link><guid isPermaLink="false">https://www.cybermaterial.com/p/hackers-exploit-powershell-script</guid><pubDate>Fri, 24 Apr 2026 12:42:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!j4Hp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j4Hp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j4Hp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!j4Hp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!j4Hp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!j4Hp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j4Hp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:550645,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195343632?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j4Hp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!j4Hp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!j4Hp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!j4Hp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc98f425-fff5-40f8-bc4c-5daf13fa0d97_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Cybercriminals are employing a novel method to hijack Telegram sessions by utilizing a PowerShell script hosted on Pastebin. This script is disguised as a Windows telemetry update, providing a unique opportunity for cybersecurity professionals to observe the construction and testing of such malicious tools.<br><br>Unlike traditional malware that often seeks to extract passwords or browser credentials, this particular script is designed specifically to target Telegram's desktop client data. By focusing solely on session data, the attackers can potentially gain unauthorized access to Telegram accounts without needing to compromise other sensitive information.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The script&#8217;s presence on Pastebin, a popular text storage site, allows it to be easily distributed and accessed by potential attackers. This method of delivery also helps the script evade detection by traditional security measures, which may not flag it as suspicious due to its appearance as a legitimate Windows update.<br><br>The impact of this attack vector is significant for users of Telegram&#8217;s desktop client, as it could lead to unauthorized access to private communications and data. This highlights the ongoing need for vigilance and robust security practices among users of messaging platforms.<br><br>To mitigate the risk of such attacks, users should be cautious of unexpected updates and verify the authenticity of any scripts before executing them. Employing comprehensive security solutions and staying informed about emerging threats can also help protect against session hijacking attempts.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://flare.io/learn/resources/blog/telegram-session-stealerpastebin-hosted-powershell-script-targets-desktop-web-sessions </p>]]></content:encoded></item><item><title><![CDATA[Trigona Ransomware Uses Custom Exfiltration Tool]]></title><description><![CDATA[The Trigona ransomware group has adopted a new strategy by employing a custom-developed tool for data exfiltration in their recent attacks.]]></description><link>https://www.cybermaterial.com/p/trigona-ransomware-uses-custom-exfiltration</link><guid isPermaLink="false">https://www.cybermaterial.com/p/trigona-ransomware-uses-custom-exfiltration</guid><pubDate>Thu, 23 Apr 2026 12:51:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!onxa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!onxa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!onxa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!onxa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!onxa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!onxa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!onxa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ebcc795e-82dc-4114-b339-079aab84f11f_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:699272,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195234807?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!onxa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!onxa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!onxa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!onxa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febcc795e-82dc-4114-b339-079aab84f11f_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The Trigona ransomware group has adopted a new strategy by employing a custom-developed tool for data exfiltration in their recent attacks. This marks a departure from the typical use of off-the-shelf utilities like Rclone or MegaSync, which are commonly used by ransomware groups. The attacks, which took place in March 2026, indicate a significant evolution in the tactics of Trigona affiliates, although the exact reasons for this shift remain unclear. It is speculated that the move towards proprietary tools is an attempt to avoid detection by security solutions that are adept at identifying known utilities.<br><br>The custom tool, named uploader_client.exe, is a command-line utility that connects to a hardcoded server controlled by the attackers. It features several advanced capabilities, including the ability to use multiple parallel connections for rapid data transfer and the ability to rotate TCP connections to evade network monitoring. Additionally, the tool allows attackers to filter out low-value files and uses an authentication key to secure access to the stolen data. This tool was observed targeting high-value documents such as invoices and PDFs stored on networked drives.<br><br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Before deploying the custom uploader, attackers attempted to disable security measures using a variety of tools. They installed the Huorong Network Security Suite tool HRSword as a kernel driver service and used other security-disabling tools like PCHunter and Gmer. These tools exploited vulnerable kernel drivers to terminate endpoint protection processes, allowing the attackers to operate with elevated privileges. Remote access was gained through AnyDesk, and credential theft was conducted using tools like Mimikatz.<br><br>The creation of a custom exfiltration tool suggests a higher level of technical sophistication among the attackers. While developing such tools requires significant resources, they offer a level of stealth that generic tools cannot achieve until they are discovered by security researchers. This approach reflects a growing trend among ransomware groups to develop proprietary tools to maintain an advantage over security defenses.<br><br>Organizations should take proactive measures to protect against such sophisticated attacks. This includes monitoring for unusual network activity, especially connections to unknown IP addresses, and ensuring that security solutions are updated to detect custom malware tools. Additionally, organizations should regularly review and update their security protocols to address vulnerabilities that could be exploited by attackers using advanced techniques.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://symantec-enterprise-blogs.security.com/threat-intelligence/trigona-exfiltration-custom</p>]]></content:encoded></item><item><title><![CDATA[New Attacks on AI Assistants]]></title><description><![CDATA[Cybersecurity researchers at Forcepoint have identified a new type of attack targeting AI assistants, specifically focusing on GitHub Copilot.]]></description><link>https://www.cybermaterial.com/p/new-attacks-on-ai-assistants</link><guid isPermaLink="false">https://www.cybermaterial.com/p/new-attacks-on-ai-assistants</guid><pubDate>Thu, 23 Apr 2026 12:50:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qKu4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qKu4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qKu4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!qKu4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!qKu4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!qKu4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qKu4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:572479,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195234383?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qKu4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!qKu4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!qKu4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!qKu4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff31c16a1-381a-4bfc-b12a-4cb7b5325a97_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Cybersecurity researchers at Forcepoint have identified a new type of attack targeting AI assistants, specifically focusing on GitHub Copilot. These attacks involve indirect prompt injection, a method that uses hidden code within websites to manipulate the AI's responses and actions.<br><br>The discovery highlights a significant vulnerability in AI systems that rely on external inputs to generate responses. By embedding malicious code within a website, attackers can indirectly influence the AI assistant's behavior without direct interaction. This method poses a risk as it can be executed without the user's knowledge, making it a stealthy and effective attack vector.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>Technically, the attack works by embedding specific commands or prompts within the HTML or JavaScript of a webpage. When an AI assistant like GitHub Copilot accesses this page, it inadvertently processes these hidden commands, potentially leading to unintended actions or data exposure. This type of attack exploits the AI&#8217;s reliance on external data sources, which are often assumed to be benign.<br><br>The impact of such attacks can be significant, especially for developers and organizations that rely on AI assistants for coding and automation tasks. If an AI assistant is compromised, it could lead to the introduction of vulnerabilities in software projects or unauthorized data access. This raises concerns about the security of AI-driven development environments.<br><br>To mitigate these risks, users and developers should be cautious about the websites they visit and the data they allow AI systems to access. Implementing security measures such as input validation and monitoring AI interactions with external sources can help protect against these indirect prompt injection attacks. Additionally, staying informed about emerging threats and regularly updating security protocols is essential for safeguarding AI systems.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://hackread.com/hackers-hidden-site-instruction-attack-ai-assistants/</p>]]></content:encoded></item><item><title><![CDATA[Namastex npm Packages Deliver CanisterWorm Malware]]></title><description><![CDATA[A new supply chain threat has emerged within the npm ecosystem, involving malicious versions of packages from Namastex.ai that deliver the CanisterWorm malware.]]></description><link>https://www.cybermaterial.com/p/namastex-npm-packages-deliver-canisterworm</link><guid isPermaLink="false">https://www.cybermaterial.com/p/namastex-npm-packages-deliver-canisterworm</guid><pubDate>Wed, 22 Apr 2026 12:48:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DgGe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DgGe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DgGe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!DgGe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!DgGe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!DgGe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DgGe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1415c58-1bea-4a64-9388-514e9ca72752_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:317078,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195029139?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DgGe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!DgGe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!DgGe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!DgGe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1415c58-1bea-4a64-9388-514e9ca72752_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A new supply chain threat has emerged within the npm ecosystem, involving malicious versions of packages from Namastex.ai that deliver the CanisterWorm malware. This malware acts as a self-propagating backdoor, mirroring the tactics of the threat actor known as TeamPCP. The attack involves replacing legitimate package contents with infected code, which then spreads across namespaces accessible via stolen credentials.<br><br>The threat actor gained access to npm publishing tokens, likely through a compromised CI/CD pipeline, allowing them to strip original functionality from legitimate packages and replace it with malicious code. These packages were then republished under the same trusted names, making detection challenging for developers and automated security tools. The campaign, identified by researchers at Socket.dev, expanded to over 135 malicious package artifacts across more than 64 unique packages by March 2026.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The CanisterWorm malware communicates with its operators using an Internet Computer Protocol (ICP) canister, acting as a command and control channel. This design allows attackers to rotate payloads without altering the implant on infected systems, making it resistant to standard takedown efforts. The malware&#8217;s worm-like behavior is triggered by a hidden postinstall hook that steals npm authentication tokens and uses them to propagate the infection across the npm registry.<br><br>Once installed, the malware collects a wide range of sensitive data, including environment variables, SSH keys, cloud credentials, and browser login storage. This data is exfiltrated using RSA public key encryption over HTTPS to the ICP canister endpoint. If no RSA key is available, the malware defaults to plaintext delivery.<br><br>Teams using Namastex.ai npm packages should treat all recent versions as potentially compromised. It is advised to immediately rotate npm tokens, GitHub tokens, cloud credentials, and SSH keys from affected systems. Additionally, auditing package publish histories for unexplained version changes and enabling install-time script analysis can help detect and prevent further infections. Python environments sharing the same credentials should also be reviewed due to observed cross-ecosystem propagation logic targeting PyPI.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://socket.dev/blog/namastex-npm-packages-compromised-canisterworm </p>]]></content:encoded></item><item><title><![CDATA[Harvester Expands Toolset with GoGra Backdoor]]></title><description><![CDATA[The Harvester APT group has introduced a new Linux variant of its GoGra backdoor, which is designed to evade detection by using legitimate Microsoft services for its command-and-control (C2) operations.]]></description><link>https://www.cybermaterial.com/p/harvester-expands-toolset-with-gogra</link><guid isPermaLink="false">https://www.cybermaterial.com/p/harvester-expands-toolset-with-gogra</guid><pubDate>Wed, 22 Apr 2026 12:47:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BxyR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BxyR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BxyR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!BxyR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!BxyR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!BxyR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BxyR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:614186,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195029027?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BxyR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!BxyR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!BxyR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!BxyR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fecb2006c-f1ca-45a5-835c-dcf4532953fa_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Harvester APT group has introduced a new Linux variant of its GoGra backdoor, which is designed to evade detection by using legitimate Microsoft services for its command-and-control (C2) operations. This development marks an expansion of Harvester's capabilities, as the group has previously been associated with Windows-based espionage campaigns. The new Linux malware has been linked to these past activities through code similarities, indicating a strategic move towards cross-platform operations by the threat actor.<br><br>The GoGra backdoor leverages the Microsoft Graph API and Outlook mailboxes to establish a covert C2 channel, effectively bypassing traditional perimeter network defenses. This tactic allows the malware to communicate with its operators without raising suspicion. The Symantec and Carbon Black Threat Hunter Team have identified this new Linux malware as part of Harvester's ongoing efforts to enhance its espionage capabilities. Initial submissions to VirusTotal suggest that the primary targets of this campaign are located in India and Afghanistan, with localized decoy documents being used to tailor attacks to specific regional demographics.<br><br>Technically, the attackers employ social engineering tactics to gain initial access to victim networks, using decoy documents that appear to be legitimate files. These documents are crafted to look like standard document files by appending extensions such as ".pdf" with a subtle space, ensuring execution as Linux binaries. The malware then deploys a Go dropper to embed and execute a 5.9 MB i386 executable, which writes its payload to a specific directory and ensures persistence through system reboots by setting up a systemd user unit and an XDG autostart entry.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>One of the most significant features of this backdoor is its use of hardcoded Azure AD application credentials to request OAuth2 tokens from Microsoft. This allows the malware to poll a specific mailbox folder at regular intervals, filtering for emails with specific subject lines. Upon receiving a command, the malware decrypts the message, executes the payload, and sends the results back to the operator, all while deleting the original tasking message to cover its tracks. This sophisticated use of Microsoft infrastructure highlights the advanced nature of Harvester&#8217;s operations.<br><br>Security professionals should be vigilant in monitoring for indicators of compromise associated with the GoGra backdoor and ensure that their defenses are updated to detect and mitigate this threat. Organizations in the targeted regions, particularly in South Asia, should be especially cautious and consider implementing additional security measures to protect against potential espionage activities by the Harvester group. For the latest protection updates, consulting resources such as the Symantec Protection Bulletin is recommended.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://symantec-enterprise-blogs.security.com/threat-intelligence/harvester-new-linux-backdoor-gogra </p>]]></content:encoded></item><item><title><![CDATA[North Korean Hackers Target Financial Organizations]]></title><description><![CDATA[North Korean hackers have launched new campaigns targeting financial organizations, specifically those involved in cryptocurrency, venture capital, and blockchain.]]></description><link>https://www.cybermaterial.com/p/north-korean-hackers-target-financial</link><guid isPermaLink="false">https://www.cybermaterial.com/p/north-korean-hackers-target-financial</guid><pubDate>Wed, 22 Apr 2026 12:46:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cSTH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cSTH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cSTH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!cSTH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!cSTH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!cSTH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cSTH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png" width="800" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:553906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/195026555?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cSTH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png 424w, https://substackcdn.com/image/fetch/$s_!cSTH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png 848w, https://substackcdn.com/image/fetch/$s_!cSTH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png 1272w, https://substackcdn.com/image/fetch/$s_!cSTH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcabb8f04-72c5-4670-a9a3-959c3acb84b6_800x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>North Korean hackers have launched new campaigns targeting financial organizations, specifically those involved in cryptocurrency, venture capital, and blockchain. These attacks are part of a broader strategy to infiltrate and exploit financial systems for potential gain.<br><br>The attackers are utilizing AppleScript and ClickFix to carry out their operations on macOS systems. AppleScript is a scripting language used to automate tasks on macOS, and ClickFix is a tool that can be used to bypass security measures. By leveraging these tools, the hackers aim to gain unauthorized access to sensitive financial data.<br><br>The technical approach involves using AppleScript to automate malicious activities and ClickFix to circumvent security protocols. This combination allows the attackers to execute their campaigns with a higher degree of stealth and effectiveness. The focus on macOS systems indicates a strategic shift, as these systems are often perceived as more secure.<br></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5d1O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png" width="1323" height="595" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:1323,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:926153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cybermaterial.com/i/188897965?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5d1O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 424w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 848w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1272w, https://substackcdn.com/image/fetch/$s_!5d1O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb40420-7ed4-4b76-8223-3670c3bd3ec9_1323x595.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://referworkspace.app.goo.gl/Sx1s&quot;,&quot;text&quot;:&quot;Claim Your Workspace&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://referworkspace.app.goo.gl/Sx1s"><span>Claim Your Workspace</span></a></p><div><hr></div><p>The impact of these attacks could be significant, potentially leading to financial losses and compromised data integrity for the targeted organizations. The focus on cryptocurrency and blockchain entities suggests an interest in exploiting emerging financial technologies, which are often less regulated and more vulnerable to sophisticated cyber threats.<br><br>Organizations in the affected sectors should prioritize enhancing their cybersecurity frameworks. This includes implementing robust security protocols, conducting regular system audits, and ensuring that all software is up-to-date. Additionally, staff should be trained to recognize and respond to potential phishing attempts and other social engineering tactics that may be used in conjunction with these technical attacks.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybermaterial.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybermaterial.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Source</strong>:  https://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/ </p>]]></content:encoded></item></channel></rss>