The Hacker News
โœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ”’ A new npm package poses as a vulnerability detector for Ethereum smart contracts but silently installs Quasar RATโ€”a remote access trojan that gives attackers:

๐Ÿ–ฅ๏ธ Full control over your system
๐Ÿ›ก๏ธ Persistence via Windows Registry tweaks
๐Ÿ“ก Command-and-Control connections to steal data

๐Ÿ”— Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
๐Ÿ‘30๐Ÿ˜ฑ8
โšก Did you know? Cross-domain attackers often stay hidden for weeks before escalating privileges.

Why do attackers thrive? Because fragmented security tools leave gapsโ€”and adversaries like FAMOUS CHOLLIMA are exploiting every one of them.

๐Ÿ’ฌ Question: Are your identity systems truly secure, or just compliant?

๐Ÿ’ก Expert Take: A unified platform transforms identity systems into secure perimeters by:
ยป Closing blind spots with end-to-end visibility.
ยป Integrating seamlessly across cloud, SaaS, and on-prem environments.
ยป Accelerating threat detection for proactive defense.

๐Ÿ‘‰ Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html

Attackers move fastโ€”your defenses need to be faster.
๐Ÿ‘17๐Ÿ”ฅ15
โš ๏ธ Researchers have uncovered details of now-patched vulnerabilities in Dynamics 365 and Power Apps Web API that exposed sensitive user data, including emails, financial information, and password hashes.

๐Ÿ”— Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
๐Ÿ‘18๐Ÿ‘7๐Ÿ”ฅ6๐Ÿ˜5โšก3
๐Ÿ”’ Apple will pay $95M to settle claims that Siri accidentally recorded and shared private conversations with third parties.

๐Ÿ“Š Key Details:
ยป Covers Siri-enabled devices from 2014 to 2024.
ยป Claim up to $20 per device (max 5).
ยป Apple introduced new privacy settings, but is it enough?

๐Ÿ”— Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
๐Ÿ”ฅ29๐Ÿ˜13๐Ÿ‘9โšก2๐Ÿค”1
๐Ÿšจ Critical Update: With Edgio services shutting down, Microsoft is migrating all .NET workloads to Azure Front Door CDNs.

๐Ÿ’ก Deadline: January 7, 2025.

๐Ÿ‘‰ Scan your codebase and update references today to avoid downtime.

Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
๐Ÿ‘18๐Ÿ˜6
๐Ÿšจ Critical Flaws in LDAP Exploited!

A new proof-of-concept exploit, LDAPNightmare, crashes unpatched Windows Servers with one crafted request.

Even worse? RCE attacks are possible with minor tweaks.

ยป CVE-2024-49113 causes DoS attacks.
ยป CVE-2024-49112 allows remote code execution.

What can you do?
โœ… Patch ASAP with Microsoftโ€™s December 2024 updates.
โœ… Monitor RPC calls and suspicious LDAP activity.

๐Ÿ‘‰ Read more: https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html
๐Ÿ”ฅ27๐Ÿคฏ10๐Ÿ‘8๐Ÿ˜3
๐Ÿšจ ALERT: New multi-turn jailbreaking attack, Bad Likert Judge, cleverly bypasses AI safety measures across six major platforms, including AWS, Google, and NVIDIA.

ยป Attack success rates spike by 60% using this technique.
ยป Tested across major platformsโ€”OpenAI, Google, and more.
ยป Categories impacted: hate speech, malware, even weapons.

๐Ÿ‘‰ Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
๐Ÿ”ฅ32๐Ÿ‘5๐Ÿค”3
๐Ÿšจ The U.S. Treasury just sanctioned Integrity Technology Group, a Beijing-based cybersecurity firm, for enabling state-sponsored cyberattacks on U.S. entities.

โ†ช Linked to Flax Typhoon (aka RedJuliett)
โ†ช Exploited IoT vulnerabilities.
โ†ช Targeted government agencies, telecoms, and universities.

๐Ÿ”— Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
๐Ÿ˜18๐Ÿ‘9๐Ÿคฏ1
shrinked-malware-execution-ezgif.com-optimize.gif
16.2 MB
โš ๏ธ ALERT: PLAYFULGHOST Targets VPN Users!

This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.

Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
๐Ÿ‘24โšก5๐Ÿค”4๐Ÿ˜ฑ3
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿšจ A severe flaw in Nuclei (CVE-2024-43405) could let attackers bypass signature checks and inject malicious code. This impacts all versions after 3.0.0โ€”scoring a 7.4 CVSS.

Read the analysis and secure your systems ๐Ÿ‘‰https://thehackernews.com/2025/01/researchers-uncover-nuclei.html
โšก16๐Ÿ˜ฑ9๐Ÿ”ฅ5๐Ÿ‘4
FireScam malware is targeting Android devices by disguising itself as a fake โ€œTelegram Premiumโ€ app. Once installed, it:

โ†ช Steals sensitive data (messages, notifications, call logs, credentials)
โ†ช Blocks legitimate app updates to remain undetected

This malware uses advanced techniques to spy on users and maintain control over devicesโ€”posing a major threat to personal and organizational data.

Get all the details ๐Ÿ‘‰ https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
๐Ÿ‘20๐Ÿ”ฅ10๐Ÿ˜ฑ4๐Ÿค”3๐Ÿ˜2
๐Ÿ”’ Critical Alert: Malicious npm packages are impersonating Hardhat tools to steal private keys and mnemonics.

โ†ช Over 1,000 downloads of a single fake package, active for over a year.
โ†ช Data is exfiltrated using hardcoded Ethereum addresses.

Open-source dependency complexity is a hackerโ€™s dreamโ€”manual reviews are becoming impossible.

๐Ÿ”ง What You Can Do:
โœ… Double-check every dependency.
โœ… Use tools to audit npm packages.
โœ… Build robust supply chain defenses.

๐Ÿ”— Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
๐Ÿ”ฅ13๐Ÿ‘7๐Ÿคฏ4๐Ÿ‘3๐Ÿ˜ฑ1
๐Ÿšจ Every second in 2024, cybercriminals attempted 7,000 password attacksโ€”up 75% from last year! Phishing surged 58%, leading to $3.5 billion in losses.

Learn the top strategies to protect your SaaS environment from these relentless threats.

Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
๐Ÿ”ฅ15๐Ÿ‘6โšก3๐Ÿค”2
India proposes draft Digital Personal Data Protection (DPDP) Rules to empower citizens with data erasure rights, enforce strict security mandates for companies, and impose penalties for non-compliance.

๐Ÿ”’ Your Rights:
โžœ Erase data on demand ๐Ÿ—‘๏ธ
โžœ Consent control for how your data is used ๐Ÿ“œ
โžœ Parental consent for minorsโ€™ data ๐Ÿ‘ถ

โš™๏ธ Business Compliance:
โžœ 72-hour breach reporting โฑ๏ธ
โžœ Annual audits & impact assessments ๐Ÿ“‹
โžœ Data security: encryption, backups, and access control ๐Ÿ”

๐Ÿ’ธ Penalties โžœ Up to โ‚น250 crore (~$30M) for non-compliance or misuse โš ๏ธ

Explore the details: https://thehackernews.com/2025/01/india-proposes-digital-data-rules-with.html
๐Ÿ‘38๐Ÿ‘13๐Ÿ”ฅ8๐Ÿค”8๐Ÿ˜7
๐Ÿšจ Two vulnerabilities (CVE-2024-9138, CVE-2024-9140) impact Moxa's routers, with CVSS scores of 8.6 and 9.3โ€”allowing root access and unauthorized command execution.

๐Ÿ”‘ Patch to version 3.14+ immediately.

You can protect your network by:
๐Ÿ›‘ Isolating devices from the internet.
๐Ÿ”— Limiting SSH access to trusted IPs.
๐Ÿ›ก Enabling strict firewall rules.

โžก๏ธ Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html
๐Ÿ‘10๐Ÿ˜5๐Ÿ‘3
โš ๏ธ CISA says thereโ€™s no evidence other federal systems were impacted in the Treasury cyberattackโ€”but the investigation is ongoing.

Attackers exploited BeyondTrustโ€™s Remote Support SaaS API key to access Treasury systems.

๐Ÿ”— Learn More: https://thehackernews.com/2025/01/cisa-no-wider-federal-impact-from.html
๐Ÿ˜11๐Ÿ”ฅ5๐Ÿ‘3
A newly upgraded version of the EAGERBEE malware is actively targeting internet service providers (ISPs) and government entities in the Middle East.

โžœ Allows load, unload, or swap plugins in memory on demand.
โžœ Linked to state-aligned groups like Cluster Alpha and TA428.
โžœ Targets military and political secrets in Southeast Asia.
Harvest network and system data with precision tools.

๐Ÿ”— Read the full report here: https://thehackernews.com/2025/01/new-eagerbee-variant-targets-isps-and.html
๐Ÿค”12๐Ÿ‘5
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ•ฏ๏ธ Legacy MFA, VPNs, and antivirus have all fallen. Why? Attackers outpaced outdated tech.

Key takeaways for decision-makers: Evolve or risk critical vulnerabilities.

โžค Integrated, AI-driven, phishing-resistant tools are non-negotiable.
โžค Zero Trust and passwordless solutions are the path forward.

Cybersecurity tools must outthink attackersโ€”not just block them.

Are your defenses ready for 2025? Find out whatโ€™s driving the next wave of innovation: https://thehackernews.com/2025/01/farewell-to-fallen-cybersecurity-stars.html
๐Ÿ”ฅ14๐Ÿ‘5๐Ÿ˜4โšก3๐Ÿคฏ1
Researchers reveal Illuminaโ€™s iSeq 100 lacks modern security measures, making it vulnerable to privilege escalation and firmware tampering.

Explore the insights here: https://thehackernews.com/2025/01/researchers-uncover-major-security-flaw.html
๐Ÿ˜17โšก3
Can you spot hidden threats in encrypted traffic? Most organizations canโ€™tโ€”and thatโ€™s exactly how attackers are winning.

In this webinar, Zscaler's Emily Laufer reveals:
๐Ÿ›ก๏ธ Advanced tactics to uncover hidden threats
๐Ÿ“ˆ Predictions for ransomwareโ€™s 2025 playbook

โžก๏ธ Watch the webinar: https://thehacker.news/ransomware-encrypted-attacks
๐Ÿ‘17๐Ÿค”2