The Hacker News
โœ”
151K subscribers
1.85K photos
10 videos
3 files
7.76K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ A security flaw, dubbed AuthQuake, in Microsoftโ€™s Multi-Factor Authentication (MFA) allowed attackers to bypass protection within an hour โ€“ no alerts, no interaction required.

Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
๐Ÿ”ฅ18๐Ÿ˜ฑ7๐Ÿ‘6
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿšจ A trusted Windows feature, UI Automation, can be exploited by #malware to bypass EDR detection, execute stealthy commands, and steal data undetected.

๐Ÿ”— Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
๐Ÿ‘20๐Ÿ”ฅ5๐Ÿคฏ4โšก3๐Ÿ˜2
A Russian state-sponsored group, Secret Blizzard, is leveraging other hackersโ€™ #malware to deploy its tools in Ukraine, raising the stakes in cyber warfare.

Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
๐Ÿ‘14๐Ÿ˜9๐Ÿ”ฅ7๐Ÿคฏ4๐Ÿ˜ฑ3๐Ÿ‘2โšก1
๐Ÿšจ Operation PowerOFF โ€” Global law enforcement just shut down 27 DDoS-for-hire platforms, dismantling major stresser services used by cybercriminals to disrupt websites.

Over 300 users and 3 admins are under investigation, with arrests made in France and Germany.

Read: https://thehackernews.com/2024/12/europol-dismantles-27-ddos-attack.html
๐Ÿ”ฅ27๐Ÿ‘4โšก3๐Ÿ˜ฑ2
Did you know? Your team could be using dozens of SaaS tools youโ€™re unaware ofโ€”right now!

Unapproved apps, duplicate tenants, and risky OAuth grants are just the tip of the iceberg. Discover how Nudge Security is revolutionizing SaaS visibility and governance.

Read more about the solution here: https://thehackernews.com/2024/01/what-is-nudge-security-and-how-does-it.html
๐Ÿ‘23
Critical flaw in Hunk Companion plugin (CVE-2024-11972, CVSS: 9.8) allows attackers to install vulnerable plugins, potentially leading to Remote Code Execution (RCE), SQL Injection, and administrative backdoors.

Over 10,000 WordPress sites are at risk. Learn steps to secure your site now: https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html
๐Ÿ‘19๐Ÿ”ฅ3
[Free] Cloud Risk Self-Assessment Checklist

Ready to secure your cloud? Easily evaluate and uncover cloud risk with this simple checklist to help strengthen your security posture.

Downlod Checklist: https://thn.news/cloud-risk-checklist
๐Ÿ‘13๐Ÿ”ฅ4๐Ÿคฏ2โšก1๐Ÿ‘1
๐Ÿšจ Apple's TCC framework #vulnerability exposed!

A now-patched flaw (CVE-2024-44131) allowed unauthorized apps to access sensitive data like Health info, microphone, and #iCloud backupsโ€”without users knowing.

Learn more: https://thehackernews.com/2024/12/researchers-uncover-symlink-exploit.html
๐Ÿ˜14๐Ÿ˜ฑ10๐Ÿ‘4โšก2๐Ÿ”ฅ2๐Ÿค”1
Gamaredon, a Russian-linked hacking group, targets mobile devices with BoneSpy and PlainGnome, #spyware stealing SMS, call logs, location, and photos in former Soviet states.

Find details here: https://thehackernews.com/2024/12/gamaredon-deploys-android-spyware.html
๐Ÿ˜14๐Ÿ‘9โšก5๐Ÿ”ฅ5
Over 296,000 Prometheus Node Exporter instances and 40,300 servers are publicly accessible, exposing sensitive credentials and API keys.

Read the full article: https://thehackernews.com/2024/12/296000-prometheus-instances-exposed.html
๐Ÿค”17โšก10๐Ÿ‘5
U.S. DoJ dismantles Rydox marketplace, seizes $225K in cryptocurrency, arrests three Kosovo nationals for selling stolen data and cybercrime tools, impacting 18,000 users.

Read the story: https://thehackernews.com/2024/12/fbi-busts-rydox-marketplace-with-7600.html
๐Ÿ˜16๐Ÿ”ฅ8โšก5๐Ÿ‘5
๐Ÿšจ New Malware Alert: PUMAKIT, a #Linux rootkit, employs advanced stealth tactics to evade detection and escalate privileges.

Itโ€™s not just hiding filesโ€”itโ€™s altering core system behavior while remaining invisible to system tools.

Learn how PUMAKIT operates ๐Ÿ‘‰ https://thehackernews.com/2024/12/new-linux-rootkit-pumakit-uses-advanced.html
๐Ÿ”ฅ17๐Ÿ‘8๐Ÿ˜ฑ5โšก2๐Ÿ˜2
๐Ÿ”ฅ Iranian-linked IOCONTROL malware exploits IoT and OT devices, targeting SCADA systems and fuel infrastructure with advanced evasion tactics like MQTT and DNS-over-HTTPS.

๐Ÿ”— Learn how this sophisticated malware operates https://thehackernews.com/2024/12/iran-linked-iocontrol-malware-targets.html
โšก24๐Ÿ˜6๐Ÿค”6๐Ÿ‘4๐Ÿ‘4๐Ÿ˜ฑ4๐Ÿ”ฅ2
๐Ÿšจ U.S. DoJ indicts 14 North Koreans for a $88M IT fraud scheme involving identity theft, extortion, and data breaches. $2.26M seized and a $5M reward announced for tips.

Learn more: https://thehackernews.com/2024/12/doj-indicts-14-north-koreans-for-88m-it.html
๐Ÿ‘21๐Ÿ”ฅ7๐Ÿคฏ4๐Ÿ˜2โšก1
๐Ÿ›ก๏ธ Critical OpenWrt #vulnerability (CVE-2024-54143) discovered โ€” With just a 12-character hash collision, attackers can replace legitimate firmware with a malicious alternative, all without authentication.

Discover the technical details: https://thehackernews.com/2024/12/critical-openwrt-vulnerability-exposes.html
๐Ÿคฏ15๐Ÿ‘12๐Ÿ”ฅ7๐Ÿ˜ฑ6๐Ÿ˜2โšก1
๐Ÿšจ Why Do Great Companies Still Get Breached? Advanced solutions donโ€™t always mean advanced protection.

๐ŸŽ™๏ธ Join Silverfortโ€™s CISO, John Paul Cunningham, as he explores:
โœ“Common vulnerabilities often overlooked, even with advanced solutions
โœ“How attackers bypass traditional defenses
โœ“ Practical strategies to address hidden risks and blind spots

๐Ÿ“… 16 December, 2024

๐Ÿ‘‰ Donโ€™t miss outโ€”Reserve your spot for this exclusive webinar: https://thehacker.news/ciso-perspective-data-breaches

๐Ÿ’ฌ โ€œStrengthening defenses isnโ€™t just about toolsโ€”itโ€™s about strategy.โ€
๐Ÿ‘19๐Ÿ”ฅ5โšก3๐Ÿค”2
"United States Department of Justice.pdf" โ€“ Legit? Think Again!

New Backdoor Targeting Thai Officials. Hackers are deploying a stealthy backdoor, Yokai, by disguising malware as trusted documents.

๐ŸŽฏ What happened? DLL side-loading enables attackers to bypass defenses.

๐Ÿ’ก Backdoor connects to attacker-controlled servers for total system control. Without proactive measures, businesses risk breaches that cost millions.

Hereโ€™s what you can do NOW:
1๏ธโƒฃ Train teams on spotting spear-phishing lures.
2๏ธโƒฃ Audit systems for DLL side-loading vulnerabilities.
3๏ธโƒฃ Strengthen your endpoint defenses.

Find details here: https://thehackernews.com/2024/12/thai-officials-targeted-in-yokai.html
๐Ÿ‘22โšก5๐Ÿ”ฅ4๐Ÿ˜2
๐Ÿšจ Could Your Device Be a Secret Cybercriminal Tool?

The Federal Office of Information Security (BSI) just disrupted BADBOX, a malware preloaded on common devices like picture frames and cheap android phones.

๐Ÿ’ก Whatโ€™s the risk?
โ‡ข Devices turned into ad fraud machines, routing hackers' internet traffic.
โ‡ข Stolen authentication codes, fake Gmail & WhatsApp accounts created.

โš ๏ธ Why it matters:
This isnโ€™t just a malware problemโ€”it's a supply chain crisis. If a device seems "too cheap," it might come with hidden costs.

๐Ÿ”— Learn more: https://thehackernews.com/2024/12/germany-disrupts-badbox-malware-on.html
๐Ÿ‘31๐Ÿ˜ฑ8โšก3๐Ÿ”ฅ2๐Ÿ˜1๐Ÿค”1
โš ๏ธ Ukraineโ€™s SSU uncovered a shocking case involving 15- and 16-year-olds who were tricked by the FSB into espionage missions disguised as innocent quests, assisting in reconnaissance for airstrikes.

๐Ÿ”Ž Key Insights:
โžŸ How: Teens were sent coordinates, tasked to take photos/videos of key locations.
โžŸ Impact: Data shared via encrypted chats led to airstrikes on Ukrainian soil.
โžŸ Key Arrests: Ukraineโ€™s SSU detained multiple operatives, including a Russian police officer orchestrating the missions.

Read how Ukraine dismantled this operation and what it means for cyber and physical security.

Full story here: https://thehackernews.com/2024/12/ukrainian-minors-recruited-for-cyber.html
๐Ÿ˜28๐Ÿคฏ19๐Ÿ‘14๐Ÿ”ฅ6๐Ÿค”5โšก1๐Ÿ‘1
๐Ÿšจ A new PHP-based backdoor, Glutton, is wreaking havoc across the globe, targeting China, the US, Cambodia, Pakistan, and South Africa. This APT41's toolkit doesnโ€™t stop thereโ€”itโ€™s also attacking cybercriminals!

โ–ถ Uses compromised enterprise hosts as bait ๐ŸŽฃ
โ–ถ Infects popular PHP frameworks like Laravel and ThinkPHP
โ–ถ Modular framework with 22 unique commands for stealthy infiltration
โ–ถ Surprisingly lacks typical nation-state-level encryptionโ€”why?
โ–ถ Leaves no files behindโ€”ensures stealth through FastCGI processes

๐Ÿ‘‰ See how Glutton operates. Read the full story: https://thehackernews.com/2024/12/new-glutton-malware-exploits-popular.html
๐Ÿคฏ16๐Ÿ‘6๐Ÿ˜4๐Ÿค”2๐Ÿ˜ฑ2๐Ÿ”ฅ1
Double Scammed? Hereโ€™s How - Fraudsters are re-victimizing people by offering โ€œrefundsโ€ via Europol and Interpol-branded scams:

๐Ÿ›‘ Fake profiles, stolen accounts, and malicious links.
๐Ÿ’ธ Promises of recovering stolen moneyโ€ฆ at a high cost.

Even educated professionals are falling prey to these advanced tactics.

๐Ÿ‘‰ Explore the latest trends and expert analysis here: https://thehackernews.com/2024/12/new-investment-scam-leverages-ai-social.html
๐Ÿ‘11๐Ÿ˜6๐Ÿ”ฅ2