The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
πŸ”₯ A dual Russian-Israeli national charged as the mastermind behind LockBit ransomwareβ€”a cyber weapon that caused chaos across 120+ countries and left $500M in illicit profits.

Β» Targeted hospitals, schools, and critical infrastructure.
Β» Gained access to systems using custom malware to disable antivirus.
Β» LockBit is now planning a comeback with version 4.0!

Explore the full story of LockBit’s rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
πŸ‘36πŸ‘12πŸ€”8⚑7
πŸ”’ Italy has fined OpenAI €15 Million for violating GDPR.

Key issues:
Β» Processing user data without legal basis
Β» Failing to notify users about a 2023 security breach
Β» No age verification, exposing kids under 13 to risky content

πŸ”— Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
😁44πŸ‘20πŸ”₯7🀯7πŸ€”6⚑3πŸ‘3
πŸ”’ A U.S. judge held NSO Group liable for breaching WhatsApp’s terms of service and misusing its servers to silently deploy Pegasus spyware, targeting 1,400 users within a single month.

Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
⚑30πŸ‘9πŸ‘8πŸ”₯5😁3🀯2😱2πŸ€”1
🚨 Rockstar2FA, a notorious phishing-as-a-service (PhaaS) toolkit, suffered a major collapse on November 11. In its place, FlowerStorm has emerged as the new threat. These tools exploit legitimate services like Cloudflare Turnstile to bypass detection effortlessly.

πŸ“ Key Targets:
Β» Sectors: Engineering, real estate, consulting
Β» Countries: U.S., Canada, UK, Germany, India

If you operate in these industries, you’re already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.

πŸ”— Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
⚑14πŸ€”9πŸ‘6
🚨 Top 10 Cybersecurity Trends for 2025: From AI-powered attacks to zero-day threats & supply chain risks, the future of cyber defense is evolving fast. Are you ready?

πŸ”— Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
πŸ‘16🀯7⚑2πŸ”₯2
πŸ‘¨β€πŸ’» Is AI rewriting cybersecurity rules? Criminals are using LLMs to create natural-looking malware that evades detection.

πŸ›‘οΈ What’s happening:
Β» 10,000+ malware variants generated at scale.
Β» 88% trick tools like VirusTotal.
Β» Detection systems risk degradation over time.

πŸ”— Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
😱12πŸ”₯8πŸ‘6😁6🀯5
⚑ A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.

An uploaded file could turn into malicious JSP codeβ€”resulting in remote code execution.

Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!

Details here πŸ‘‰ https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
πŸ‘27😁19🀯10⚑5πŸ‘3πŸ”₯1
🚨 CISA has added a high-severity vulnerability in USAHERDS (CVE-2021-44207) to its Known Exploited Vulnerabilities (KEV) catalog. This flaw has an 8.1 CVSS score and allows attackers to execute arbitrary code on affected servers.

Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
πŸ‘14⚑4😁3😱2πŸ”₯1
πŸ”’ $308M stolen in a daring crypto heist targeting DMM Bitcoin. North Korean hackers used social engineering and malware to exploit insider access.

πŸ‘‰ Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
😱23πŸ”₯16πŸ‘9🀯6⚑4
🚨 Charming Kitten strikes again! Iranian hackers deploy a new C++ variant of the infamous BellaCiao malware, targeting machines across Asia.

Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
😁26πŸ‘16🀯5πŸ”₯3πŸ€”3
⚠️ Apache Traffic Control usersβ€”an SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.

This flaw is easily exploitable by sending a specially crafted PUT request.

πŸ”§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.

Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
πŸ‘30😁9🀯8⚑7πŸ”₯7πŸ€”3😱1
A Brazilian hacker faces U.S. charges for extorting $3.2M in Bitcoin after stealing confidential data from 300,000 customers.

Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
πŸ”₯56πŸ‘19πŸ‘10πŸ€”6⚑3🀯2
🚨 A critical CVE-2024-52046 vulnerability in Apache MINA, scoring a perfect CVSS 10.0, could enable remote code execution.

The flaw lies in Java’s deserialization protocol, leaving systems wide open to attack if improperly secured.

Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
πŸ”₯20😁7πŸ‘6😱3⚑2
πŸ”’ When Devices Turn Against You!

Two dangerous botnetsβ€”FICORA and CAPSAICINβ€”are hijacking vulnerable D-Link routers through known weaknesses.

⚠️ Attack methods include brute force, shell execution, and 12+ DDoS variations.

See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
πŸ‘18πŸ”₯6😁6⚑3😱3
πŸ”₯ CVE-2024-3393 Alert! A single malicious DNS packet can reboot your Palo Alto firewall and leave your network defenseless.

Important to Know:
Β» This flaw impacts PAN-OS 10.X & 11.X, including Prisma Access.
Β» Repeated attacks could force your firewall into maintenance mode.
Β» Legacy PAN-OS 11.0 users? No fixesβ€”it’s time to upgrade!

βš™οΈ How to Fix:
Β» Update to PAN-OS 10.1.14-h8 or later.
Β» Use workarounds to disable risky logging until upgrades are complete.

Read now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
🀯32πŸ”₯9😁7πŸ‘5⚑2πŸ€”1
πŸ›‘ Cloud Atlas is deploying VBShower and PowerShowerβ€”malware that operates in stages, infiltrating networks and harvesting credentials.

πŸ“‚ Quick Actions:
βœ”οΈ Patch outdated vulnerabilities like CVE-2018-0802 immediately
βœ”οΈ Monitor for unusual cloud storage activity
βœ”οΈ Deploy advanced monitoring tools for NTFS file changes.
βœ”οΈ Conduct phishing simulations to bolster employee awareness.

Find details here: https://thehackernews.com/2024/12/cloud-atlas-deploys-vbcloud-malware.html
πŸ€”16πŸ‘10⚑2πŸ”₯2
North Korean hackers are targeting job seekers with a deceptive campaign, deploying a new malware called OtterCookie through fake interview tools.

This new JavaScript malware, is:
Β» Stealing files and cryptocurrency wallets.
Β» Communicating directly with attackers via socket(.)io
Β» Constantly evolving to bypass detection.

πŸ”— Full Report: https://thehackernews.com/2024/12/north-korean-hackers-deploy-ottercookie.html
πŸ”₯26πŸ‘16😁6😱6πŸ‘5⚑1
⚠️ 15,000+ Four-Faith routers are exposed, with attackers actively exploiting a command injection flaw (CVE-2024-12856).

1️⃣ Attackers execute commands remotely via the adj_time_year parameter.
2️⃣ Reverse shells enable hackers to stay hidden and in control.

Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
😱28πŸ‘17πŸ€”5⚑3πŸ”₯2
πŸ›‘ 600,000+ users impacted! A widespread campaign compromised 16+ extensions, including tools for AI and VPNs, using phishing and malicious code injection.

Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
🀯29πŸ‘15😁11πŸ€”7⚑4πŸ”₯1
What if your password manager or note-taking tool became a hacker’s entry point? Recent attacks on Chrome Store extensions reveal just how exposed your organization might be.

❓ Why It Matters:
Β» Browser extensions are a silent threatβ€”granted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.

πŸ’‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.

πŸ”— Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
πŸ‘21😁11πŸ‘3⚑2πŸ”₯2πŸ€”1😱1