๐จ Last Week in Cybersecurity...
Routers hacked, malicious PyPI packages detected, new ransomware decryptors released, and major threats uncovered.
Read: https://thehackernews.com/2025/03/thn-weekly-recap-router-hacks-pypi.html
Stay informedโstay secure. #THNWeeklyRecap
Routers hacked, malicious PyPI packages detected, new ransomware decryptors released, and major threats uncovered.
Read: https://thehackernews.com/2025/03/thn-weekly-recap-router-hacks-pypi.html
Stay informedโstay secure. #THNWeeklyRecap
๐14โก8๐4
๐จ Apache Tomcat Under Attack.
Hackers are actively exploiting CVE-2025-24813 just 30 hours after disclosure.
๐น RCE & Info Disclosure Risk
๐น No Authentication Needed
๐น Attackers Upload & Execute Malicious Files
โ ๏ธ Delaying could mean backdoors, config tampering & full compromise.
Read: https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html
Donโt waitโsecure your systems NOW
Hackers are actively exploiting CVE-2025-24813 just 30 hours after disclosure.
๐น RCE & Info Disclosure Risk
๐น No Authentication Needed
๐น Attackers Upload & Execute Malicious Files
โ ๏ธ Delaying could mean backdoors, config tampering & full compromise.
Read: https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html
Donโt waitโsecure your systems NOW
๐25๐ฅ15๐11๐คฏ4๐1๐ค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐ New Malware Alert โ Microsoft warns of StilachiRAT, a stealthy remote access trojan that:
๐น Steals browser passwords & clipboard data
๐น Targets crypto wallets
๐น Executes remote commands & monitors RDP sessions
๐น Evades detection by clearing event logs
Read: https://thehackernews.com/2025/03/microsoft-warns-of-stilachirat-stealthy.html
๐ต๏ธโโ๏ธ No known actor yet, but itโs spreading. Protect your assets NOW.
๐น Steals browser passwords & clipboard data
๐น Targets crypto wallets
๐น Executes remote commands & monitors RDP sessions
๐น Evades detection by clearing event logs
Read: https://thehackernews.com/2025/03/microsoft-warns-of-stilachirat-stealthy.html
๐ต๏ธโโ๏ธ No known actor yet, but itโs spreading. Protect your assets NOW.
๐21๐ค7๐ฑ6
โ ๏ธ Your Device Might Be Part of the Largest CTV Botnet Ever!
Cybercriminals are exploiting cheap Android devices to build a massive botnet for:
๐น Ad fraud & fake clicks
๐น Residential proxy abuse
๐น DDoS attacks & account takeovers
๐น Hidden malware pre-installed in devices
Learn more: https://thehackernews.com/2025/03/badbox-20-botnet-infects-1-million.html
๐ 1M+ devices infected worldwide, mostly in Brazil, US, & Mexico. Google removed 24 malicious apps, but the operation is still evolving.
Cybercriminals are exploiting cheap Android devices to build a massive botnet for:
๐น Ad fraud & fake clicks
๐น Residential proxy abuse
๐น DDoS attacks & account takeovers
๐น Hidden malware pre-installed in devices
Learn more: https://thehackernews.com/2025/03/badbox-20-botnet-infects-1-million.html
๐ 1M+ devices infected worldwide, mostly in Brazil, US, & Mexico. Google removed 24 malicious apps, but the operation is still evolving.
๐16๐5
๐จ China-linked MirrorFace just carried out a stealthy attack on a European diplomatic groupโusing:
๐น ANEL backdoorโrevived after 6 years
๐น AsyncRAT & HiddenFace malware
๐น Stealthy access via VS Code Remote Tunnels
Learn more: https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html
๐น ANEL backdoorโrevived after 6 years
๐น AsyncRAT & HiddenFace malware
๐น Stealthy access via VS Code Remote Tunnels
Learn more: https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html
๐ค16๐7๐5๐ฅ3โก1๐1
What are the essential skills security analysts need to succeed?
IDC's latest survey of 900+ security leaders reveals the top five.
Uncover these and more findings in a live webinar with sponsors Tines and AWS.
Sign up to attend: https://thn.news/voice-of-security-2025-tw
IDC's latest survey of 900+ security leaders reveals the top five.
Uncover these and more findings in a live webinar with sponsors Tines and AWS.
Sign up to attend: https://thn.news/voice-of-security-2025-tw
๐11๐2๐2๐ค2
๐จ 331 Malicious Android Google Play Apps, 60 Million+ Downloads!
The Vapor scam used:
๐น Full-screen adsโlocking devices
๐น Phishing attacksโstealing credentials & credit cards
๐น Hidden icons & impersonationโevading detection
๐น Versioning tricksโturning clean apps malicious later
โ ๏ธ Check your phone NOW. Delete suspicious apps!
๐ Full details โ https://thehackernews.com/2025/03/new-ad-fraud-campaign-exploits-331-apps.html
The Vapor scam used:
๐น Full-screen adsโlocking devices
๐น Phishing attacksโstealing credentials & credit cards
๐น Hidden icons & impersonationโevading detection
๐น Versioning tricksโturning clean apps malicious later
โ ๏ธ Check your phone NOW. Delete suspicious apps!
๐ Full details โ https://thehackernews.com/2025/03/new-ad-fraud-campaign-exploits-331-apps.html
๐ค12๐ฅ6๐4๐3โก1
๐จ Critical AMI BMC Vulnerability (CVE-2024-54085) โ CVSS 10.0!
A severe authentication bypass flaw allows attackers to:
๐น Remotely control servers & deploy malware
๐น Tamper with firmware, brick motherboards & cause reboot loops
๐น Potentially damage hardware
โ ๏ธ Affected: HPE, ASUS, ASRockRack & more
๐ Read more: https://thehackernews.com/2025/03/new-critical-ami-bmc-vulnerability.html
๐ข Admins: Patch ASAP! Patches released (March 11, 2025), OEM updates required.
A severe authentication bypass flaw allows attackers to:
๐น Remotely control servers & deploy malware
๐น Tamper with firmware, brick motherboards & cause reboot loops
๐น Potentially damage hardware
โ ๏ธ Affected: HPE, ASUS, ASRockRack & more
๐ Read more: https://thehackernews.com/2025/03/new-critical-ami-bmc-vulnerability.html
๐ข Admins: Patch ASAP! Patches released (March 11, 2025), OEM updates required.
๐9๐5๐คฏ3
๐จ WARNING: Windows Zero-Day!
A still-unpatched flaw (ZDI-CAN-25373) in Windows has been actively exploited since 2017 by state-backed hackers from China, Russia, Iran & North Korea for cyber espionage & data theft.
๐น 1,000+ malicious .LNK files discovered
๐น Targets: Governments, banks, telecoms, defense sectors
Learn more: https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
Microsoft wonโt release a patch, citing โlow severityโ
A still-unpatched flaw (ZDI-CAN-25373) in Windows has been actively exploited since 2017 by state-backed hackers from China, Russia, Iran & North Korea for cyber espionage & data theft.
๐น 1,000+ malicious .LNK files discovered
๐น Targets: Governments, banks, telecoms, defense sectors
Learn more: https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
Microsoft wonโt release a patch, citing โlow severityโ
๐คฏ20๐8โก4๐3๐3
๐ฅ Breaking: Google is acquiring cloud security firm Wiz for $32 Billionโits largest deal in history.
๐ฐ Largest acquisition in Googleโs history
๐ก๏ธ Boosts AI-powered cloud security
๐ Wiz remains independent, still working with AWS, Azure, Oracle
https://thehackernews.com/2025/03/google-acquires-wiz-for-32-billion-in.html
๐ฐ Largest acquisition in Googleโs history
๐ก๏ธ Boosts AI-powered cloud security
๐ Wiz remains independent, still working with AWS, Azure, Oracle
https://thehackernews.com/2025/03/google-acquires-wiz-for-32-billion-in.html
๐ฑ22๐ฅ9๐6โก2
๐จ Android Threat Hunters, Your Job Just Got Easier!
ANY.RUN has just released a brand-new OS designed for real-time Android threat analysis inside a secure sandbox environment.
Now, businesses and security teams can:
โ Detect Android threats faster
๐ Investigate APK behavior in real time
โก Speed up incident response
๐ฐ Reduce cybersecurity costs
Best part? Itโs available for all plansโeven FREE users!
๐ Try now: https://thn.news/malware-sandbox-android-tg
ANY.RUN has just released a brand-new OS designed for real-time Android threat analysis inside a secure sandbox environment.
Now, businesses and security teams can:
โ Detect Android threats faster
๐ Investigate APK behavior in real time
โก Speed up incident response
๐ฐ Reduce cybersecurity costs
Best part? Itโs available for all plansโeven FREE users!
๐ Try now: https://thn.news/malware-sandbox-android-tg
๐21๐ฅ13๐ฑ3
๐จ Is Your Okta Environment Secure? Even with best practices, misconfigurations and identity sprawl can leave your system exposed.
โ ๏ธ Key risks:
โ Inactive admin accounts & weak MFA
โ Misconfigured security settings
โ Forgotten API tokens granting access
โ Lingering access for ex-employees
๐ Learn how to protect your identity infrastructure: https://thehackernews.com/2025/03/how-to-improve-okta-security-in-four.html
โ ๏ธ Key risks:
โ Inactive admin accounts & weak MFA
โ Misconfigured security settings
โ Forgotten API tokens granting access
โ Lingering access for ex-employees
๐ Learn how to protect your identity infrastructure: https://thehackernews.com/2025/03/how-to-improve-okta-security-in-four.html
๐9
๐ New Rules File Backdoor attack lets hackers poison AI-powered tools like GitHub Copilot & Cursor, injecting hidden malicious code into projects.
๐น Invisible backdoors via Unicode tricks
๐น Supply chain riskโspreads across repos
๐น No alertsโdevelopers unknowingly ship compromised code
Review AI-generated code carefullyโyour โtrusted assistantโ might be compromised.
๐ Learn more: https://thehackernews.com/2025/03/new-rules-file-backdoor-attack-lets.html
๐น Invisible backdoors via Unicode tricks
๐น Supply chain riskโspreads across repos
๐น No alertsโdevelopers unknowingly ship compromised code
Review AI-generated code carefullyโyour โtrusted assistantโ might be compromised.
๐ Learn more: https://thehackernews.com/2025/03/new-rules-file-backdoor-attack-lets.html
๐16๐1๐คฏ1
๐จ GitHub Actions are under attack!
A supply chain attack hit tj-actions/changed-files, leaking AWS keys, GitHub PATs & more. CISA confirms active exploitation.
๐น CVE-2025-30066 (CVSS 8.6)
๐น Attack spread via another compromised Action
๐น Sensitive secrets exposed via logs
Details: https://thehackernews.com/2025/03/cisa-warns-of-active-exploitation-in.html
โ ๏ธ Rotate secrets, audit workflows, pin actions to commitsโthis wonโt be the last attack.
A supply chain attack hit tj-actions/changed-files, leaking AWS keys, GitHub PATs & more. CISA confirms active exploitation.
๐น CVE-2025-30066 (CVSS 8.6)
๐น Attack spread via another compromised Action
๐น Sensitive secrets exposed via logs
Details: https://thehackernews.com/2025/03/cisa-warns-of-active-exploitation-in.html
โ ๏ธ Rotate secrets, audit workflows, pin actions to commitsโthis wonโt be the last attack.
๐คฏ18๐ฅ7๐3๐3
๐จ Critical SCADA Flaws โ Researchers uncovered 2 critical vulnerabilities (CVSS 9.3) in mySCADA myPRO, allowing attackers to execute system commands & hijack operations.
๐น CVE-2025-20014 & CVE-2025-20061
๐น Full Industrial Network Compromise Possible
Details here: https://thehackernews.com/2025/03/critical-myscada-mypro-flaws-could-let.html
๐น CVE-2025-20014 & CVE-2025-20061
๐น Full Industrial Network Compromise Possible
Details here: https://thehackernews.com/2025/03/critical-myscada-mypro-flaws-could-let.html
๐17๐คฏ4โก2๐ฅ1๐ค1
๐จ ClearFake Malware Spreading Fast!
Hackers use fake reCAPTCHA & Cloudflare checks to deploy Lumma & Vidar Stealer malware.
๐น 9,300+ infected sites
๐น 200,000+ users exposed (July 2024)
๐น Now using Binance Smart Chain for stealth
Learn more: https://thehackernews.com/2025/03/clearfake-infects-9300-sites-uses-fake.html
Hackers use fake reCAPTCHA & Cloudflare checks to deploy Lumma & Vidar Stealer malware.
๐น 9,300+ infected sites
๐น 200,000+ users exposed (July 2024)
๐น Now using Binance Smart Chain for stealth
Learn more: https://thehackernews.com/2025/03/clearfake-infects-9300-sites-uses-fake.html
โก12๐9๐ค8
๐ก Top 7 AI Risk Mitigation Strategies
AI security secrets? Discover the 7 essential concepts, techniques, and mitigation strategies for securing your AI pipelines.
Learn more: https://thn.news/genai-security-cheat-sheet
AI security secrets? Discover the 7 essential concepts, techniques, and mitigation strategies for securing your AI pipelines.
Learn more: https://thn.news/genai-security-cheat-sheet
๐ฅ7๐4โก2
โ ๏ธ SaaS identity attacks are exploding!
Hackers are stealing credentials, hijacking logins, and abusing privilegesโyet most security tools overlook SaaS identity threats.
๐ก๏ธ The Fix? Identity Threat Detection & Response (ITDR)
๐ Secure SaaS now โ https://thehackernews.com/2025/03/5-identity-threat-detection-response.html
Hackers are stealing credentials, hijacking logins, and abusing privilegesโyet most security tools overlook SaaS identity threats.
๐ก๏ธ The Fix? Identity Threat Detection & Response (ITDR)
๐ Secure SaaS now โ https://thehackernews.com/2025/03/5-identity-threat-detection-response.html
๐8๐6๐ฑ4๐1
๐ฅ Russiaโs Role in Cybercrime Just Got Exposed!
200,000+ leaked messages expose direct ties between the ransomware gang & Russian officials.
๐น AI-powered fraud & malware dev
๐น Leader escaped via a "green corridor"
Read the full story ๐ https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html
200,000+ leaked messages expose direct ties between the ransomware gang & Russian officials.
๐น AI-powered fraud & malware dev
๐น Leader escaped via a "green corridor"
Read the full story ๐ https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html
๐16๐11โก8๐ฅ5๐ค1
๐จ Severe PHP Flaw Under Attack.
Hackers are exploiting CVE-2024-4577 to deploy crypto miners โ๏ธ & Quasar RAT on Windows servers.
๐น 54% of attacks target Taiwan
๐น 5% deploy XMRig miner
๐น PHP CGI mode at risk
Patch NOW before your servers become a battleground.
๐ Learn more: https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html
Hackers are exploiting CVE-2024-4577 to deploy crypto miners โ๏ธ & Quasar RAT on Windows servers.
๐น 54% of attacks target Taiwan
๐น 5% deploy XMRig miner
๐น PHP CGI mode at risk
Patch NOW before your servers become a battleground.
๐ Learn more: https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html
๐ฅ17๐3โก2๐2๐1
๐จ Hackers are hijacking compromised Signal accounts to spread Dark Crystal RAT malwareโtargeting Ukraineโs military & defense industry.
๐น Fake meeting minutes ๐
๐น Hidden malware inside archives ๐ฆ
๐น Remote control & data theft
Read more: https://thehackernews.com/2025/03/cert-ua-warns-dark-crystal-rat-targets.html
๐น Fake meeting minutes ๐
๐น Hidden malware inside archives ๐ฆ
๐น Remote control & data theft
Read more: https://thehackernews.com/2025/03/cert-ua-warns-dark-crystal-rat-targets.html
๐ค13๐8๐ฅ5โก4๐1