International Cyber Digest
4.61K subscribers
358 photos
19 videos
2 files
45 links
Your weekly go-to cybersecurity newsletter, curated and commented on by our senior analysts.
Download Telegram
πŸš¨β€ΌοΈ Mercor has paid ransom to ShinyHunters following the LiteLLM supply chain breach compromise.

Mercor works with major AI companies including OpenAI and Anthropic to train AI models.
❀11😱1
❗️RANSOM-ISAC published a solid piece on TeamPCP β€” featuring several of our posts.

https://www.ransom-isac.com/blog/supply-chain-confidence/
❀2
πŸš¨β€ΌοΈ BREAKING: The Crunchyroll breach data, leaked via an Indian outsourcing partner, has been sold.

1.2 million of 2 million customer records were purchased by a single buyer.

We've obtained the 1.2 million emails from Mr. Raccoon and will be sharing them with HaveIBeenPwned.
❀19
‼️ We have just updated the TeamPCP supply chain attack tracker at https://teampcp.cyberdigest.international/ after TeamPCP supplied us with a small list.

89 Total affected orgs!

Bringing the total to 68 alleged victims:

πŸ‡ΊπŸ‡Έ MedWork (medwork[.]io)
πŸ‡§πŸ‡· Tuna Pagamentos (tunapagamentos[.]com[.]br) β€” [data sold]
πŸ‡¨πŸ‡­ Sportradar (sportradar[.]com) β€” [data open for sale, NASDAQ ~$4.98B]
πŸ‡§πŸ‡· Nuvidio (nuvidio[.]com[.]br)
πŸ‡¨πŸ‡¦ IDMelon / SecurityKey (idmelon[.]com)
πŸ”₯6
This media is not supported in your browser
VIEW IN TELEGRAM
When you lied on your resume.
😁7😒5🀣4
β€ΌοΈπŸ‡«πŸ‡· France just mandated digital ID for every citizen by banning social media for minors.

Under 15s will be blocked from IG, TikTok, FB, Snapchat and any platform allowing interactions, public broadcasts or user communities.

The banlist is determined by French regulator Arcom.
πŸ‘14😭8πŸ€ͺ6🀬3😁2😒1πŸ’©1
πŸš¨πŸ‡°πŸ‡΅ North Korean state-backed hackers had a great year, they have been 'paid' $2.02 billion in 'bug bounties' in 2025.

According to ChainAnalysis North Korean hackers stole $2.02 billion in crypto in 2025, a 51% year-over-year increase, bringing their all-time total to $6.75 billion.

They're doing fewer attacks, but bigger hauls. The DPRK is embedding IT workers inside crypto firms and using sophisticated impersonation tactics targeting executives.

After major thefts, laundering follows within 45 days β€” predominantly through Chinese-language services, bridges and mixing protocols.
πŸ”₯12πŸ‘11
‼️ A BIZARRE copyright claim system abuse happened on YouTube. Italian TV channel La7 used Nvidia's DLSS 5 trailer footage in a broadcast, then filed copyright claims against Nvidia and other YouTubers using the same material. Their videos are now taken down.
🀣33❀2😭1
‼️ Google, Meta, Microsoft and Snap are pushing the EU to quickly revive 'Chat Control 1.0' β€” a now-expired exemption allowing indiscriminate mass scanning of user data for 'abuse material'.

Digital rights experts claim tech firms are deliberately spreading fear to protect their profits and data access β€” and that mass surveillance won't save a single child.

The exemption lapsed last week. The companies call this "irresponsible."

β†’ 99% of all EU police reports came from Meta alone
β†’ 48% of flagged chats were irrelevant to criminal proceedings
β†’ 40% of German investigations targeted minors sharing consensual images
β†’ PhotoDNA scanning software found "unreliable" by researchers
β†’ 0.0000027% of scanned messages were actually illegal
β†’ No measurable link between mass scanning and actual convictions

Chat Control 1.0 disinformation, fact-checked:

β†’ "Parliament's fault" β€” EU member states sabotaged talks to protect Chat Control 2.0
β†’ "Tech is precise" β€” 13-20% error rates, 0.0000027% of scanned messages were actually illegal
β†’ "Victims want this" β€” Real victims are suing against it
β†’ The loudest lobbyist? US company Thorn β€” who sells the scanning software

Mass surveillance was never about protecting children, but for profits.
🀬12❀9πŸ‘4
This media is not supported in your browser
VIEW IN TELEGRAM
β€ΌοΈπŸ‡°πŸ‡΅ A North Korean state-sponsored hacker is asked during a job interview to say "Kim Jong-un is a fat ugly pig."

He unmasked himself by refusing β€” as saying it would most certainly lead to his execution.
🀣45😭11😒1
πŸš¨β€ΌοΈ An angry researcher just dropped a Windows Defender 0day exploit, he has a message to Microsoft:

"I'm not explaining how this works, yall geniuses can figure it out."

The exploit targets Defender's internal signature update mechanism to achieve local privilege escalation.

Researcher "Chaotic Eclipse" has dropped a full PoC for a vulnerability in Windows Defender's signature update mechanism.

The attack chain:

β†’ Connects to Defender's internal RPC interface (IMpService) to call the engine signature update function
β†’ Downloads the real Defender update package from Microsoft and extracts the embedded .cab in-memory
β†’ Abuses NTFS symlinks/junctions via undocumented NT APIs to redirect Defender's SYSTEM-context file operations
β†’ Uses Windows Cloud Files API callbacks + Volume Shadow Copy for race condition synchronization
β†’ Includes offline registry manipulation via Microsoft's offreg library
β†’ Full result: local privilege escalation / security bypass through Defender's own update process running as SYSTEM

⚠️ Author claims this is unpatched at time of disclosure.

πŸ”— github.com/Nightmare-Eclipse/BlueHammer

Note: Author acknowledges bugs in the PoC that may prevent consistent execution.
😁14❀8πŸ”₯4
This media is not supported in your browser
VIEW IN TELEGRAM
You can now whip Claude for it to work faster…

https://github.com/GitFrog1111/badclaude

npm install -g badclaude
badclaude
🀣29😱1πŸ₯΄1
Someone has hacked North Korean hackers and sent us footage.

Still working to confirm. Here's a sneak peek.
πŸ‘15❀2🀯2πŸ₯΄1
‼️ A BreachForums administrator has allegedly been identified β€” caught using his real IP and reusing the same passwords across his criminal persona and business accounts.

Meet Angel Tsvetkov AKA N/A: a Bulgarian cybersecurity specialist, penetration tester and bug bounty researcher known for responsibly disclosing vulnerabilities in major global platforms.

Harvard acknowledgement. HackerOne profile. Responsible disclosure credits from Ford, Bosch and the BBC.

Also allegedly: BreachForums admin, escrow fraudster, double exit scammer.

Mr. Tsvetkov made some threat actors really angry after trying to exit scam BreachForums:

β†’ March 15: forum goes dark: later confirmed as an exit scam by administrator N/A
β†’ March 25: N/A relaunches under alias "Caine" using a February backup
β†’ March 27: moderation team confirms Caine = N/A, entire mod team resigns
β†’ N/A attempts to sell the forum again

And as a reaction he has been published on the Wall of Fame of PwnForums.
😱17😁2πŸ₯°1