The Hacker News
โœ”
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ”’ Silent Lynx's Multi-Stage Attack Exposed: Targeting Embassies, Law Firms, and Banking Institutions

The group leverages RAR files, C++ binaries, and PowerShell scripts to infiltrate systems and exfiltrate sensitive data.

Read the full article here: https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html
๐Ÿคฏ9โšก6
๐Ÿ”’ Hackers are exploiting tools like Axios and Node Fetch to take over Microsoft 365 accountsโ€”targeting high-value employees across industries like finance, healthcare, and IT.

Attack volume spiked to over 13 million login attempts in one password spraying campaign.

Read the full report: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html
๐Ÿ‘8๐Ÿ”ฅ7โšก5๐Ÿ˜ฑ3
๐Ÿšจ WARNING: Infamous North Korea-linked Lazarus Group is using fake job offers to spread cross-platform malwareโ€”targeting crypto and travel industries.

๐Ÿกโœˆ๏ธ Fake recruiter offers remote positions in crypto/travel
๐Ÿ“„ Victims send personal info (CVs, GitHub links)
โ€ผ๏ธ Attackers deploy a JavaScript data stealer and Python backdoor

This is a complex attack chain that can give attackers persistent remote access to your systems.

Learn more: https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html
๐Ÿ‘14๐Ÿคฏ11โšก8๐Ÿ˜6
๐Ÿ”ด Hacktivism has evolved โ€“ from political protest to full-blown cyber warfare. The latest surge in DDoS attacks is shaking both the public and private sectors.

These attacks are not just about disruptionโ€”they're designed to manipulate public opinion and disrupt elections. Now's the time to be aware.

Want to know how geopolitics is shaping the cyber landscape? Read the full analysis now:

https://thehackernews.com/expert-insights/2025/02/hacking-in-name-of.html
๐Ÿ”ฅ20๐Ÿ‘10๐Ÿ˜4โšก2๐Ÿค”2
๐Ÿ›‘ Cisco just patched two critical vulnerabilities in Identity Services Engine (ISE) that could allow attackers to execute arbitrary commands and escalate privileges remotely.

โš ๏ธ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.

Read โ€” https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
๐Ÿ˜17๐Ÿ”ฅ4๐Ÿ‘2๐Ÿ‘1
๐Ÿ›‘ North Korea-linked Kimsuky hacking group now using forceCopy, a new info-stealer malware targeting browser credentials.

Spear-phishing emails trick victims into opening disguised Windows shortcut files. PowerShell and mshta.exe trigger malware download, leading to deeper infection.

๐Ÿ‘‰ Read More: https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html
๐Ÿ‘8๐Ÿค”7โšก3๐Ÿ˜3๐Ÿ‘1
๐Ÿšจ New malware campaign "SparkCat" has been discovered on Apple and Google app stores, using OCR to target crypto wallet recovery phrases.

Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
๐Ÿค”12๐Ÿคฏ6๐Ÿ˜4๐Ÿ‘1
Ransomware is hitting harder in 2025. Hackers demand millionsโ€”and paying up doesnโ€™t guarantee youโ€™ll get your data back.

LockBit, Lynx, and Virlockโ€”ransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.

Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
๐Ÿ‘14โšก8๐Ÿค”3๐Ÿ”ฅ2
PAM isnโ€™t just a cybersecurity tool. Itโ€™s a game-changer for operational efficiency, compliance & security.

โ€ข Enforces the principle of least privilege
โ€ข Boosts regulatory compliance
โ€ข Protects from evolving threats

Donโ€™t miss out on this essential shift in cybersecurity leadership.

Read: https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html
๐Ÿ‘8๐Ÿ”ฅ7๐Ÿ‘1๐Ÿคฏ1
โš ๏ธ Big names like LockBit and BlackCat are collapsing, but smaller players are multiplying. Cybercriminals raked in $813.5M from ransomware in 2024โ€”a sharp drop from $1.25B in 2023.

Smaller, faster, and more dangerousโ€”ransomware just got a whole lot trickier.

Get the full insights: https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html
๐Ÿคฏ11๐Ÿ‘4๐Ÿ”ฅ2๐Ÿ˜ฑ1
Bogus websites masquerading as Google Chrome are now distributing ValleyRATโ€”an evolving remote access trojan.

Targeting high-value roles in finance, accounting, and sales, this threat actorโ€”Silver Foxโ€”strategically targets sensitive systems.

Read the full report: https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html
๐Ÿ‘10๐Ÿ”ฅ8โšก6๐Ÿ‘3๐Ÿ˜1
๐Ÿšจ URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware.

CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution.

๐Ÿ‘‰ Secure your systems and read the full details: https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
๐Ÿ”ฅ15๐Ÿ‘7โšก2๐Ÿ˜2๐Ÿคฏ2
The RBI is introducing a dedicated "bank[.]in" domain to combat digital fraud and secure digital transactions.

Read the full article: https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html
๐Ÿ”ฅ8๐Ÿ‘5โšก3๐Ÿค”2๐Ÿคฏ2๐Ÿ˜1
๐Ÿšจ Alert: Publicly exposed ASP'NET machine keys could give attackers an easy way to infiltrate your systems.

๐Ÿ”‘ Over 3,000 keys are now available for exploitation. Microsoft reveals how attackers can inject malicious code using these keys to gain remote code execution.

๐Ÿ”— Read full article: https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html
๐Ÿ”ฅ9โšก6๐Ÿ‘5๐Ÿ‘3๐Ÿ˜1
๐Ÿšจ CISA warns of active exploitation in Trimble Cityworks GIS software, with a high-severity vulnerability (CVE-2025-0994, CVSS 8.6) being weaponized in the wild.

If left unpatched, attackers could gain unauthorized access and deploy harmful payloads like Cobalt Strike and VShell.

Read: https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html
๐Ÿ‘8๐Ÿ˜4โšก2๐Ÿ”ฅ1
๐Ÿ”’ AI-Powered Social Engineering is Here โ€“ And It's Evolving FAST!

Criminals are automating and personalizing attacks, making them more effective than ever.

AI-generated phishing emails and deepfake CFOs are tricking employees into transferring millions.

๐Ÿ‘‰ Learn how to equip your workforce to spot deception: https://thehackernews.com/2025/02/ai-powered-social-engineering.html
๐Ÿ‘18๐Ÿค”8โšก3๐Ÿ˜2
๐Ÿ›‘ DeepSeek's iOS app is transmitting sensitive user data without encryption to a cloud platform linked to ByteDance (TikTok), leaving it wide open to hackers.

๐Ÿ‘‰ See the full story and analysis here: https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html
๐Ÿคฏ62๐Ÿ˜46๐Ÿ‘18โšก5๐Ÿค”5๐Ÿ‘4
โš ๏ธ Researchers have uncovered two malicious ML models on Hugging Face using a new attack methodโ€”"broken" pickle filesโ€”to bypass detection.

These models execute a reverse shell right from the start, connecting to a hard-coded IP.

๐Ÿ”ง Learn more: https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html
๐Ÿ˜21๐Ÿ˜ฑ12๐Ÿ”ฅ11๐Ÿ‘7๐Ÿค”5๐Ÿคฏ4โšก2
๐Ÿ›‘ XE Group has evolved. Theyโ€™re no longer just stealing credit card dataโ€”theyโ€™re exploiting zero-day vulnerabilities (like CVE-2024-57968 in VeraCore) to target supply chains

Once in, they can drop reverse shells, exfiltrate files, and even modify data

https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
๐Ÿ˜8๐Ÿ‘4๐Ÿ˜ฑ3โšก2๐Ÿค”2
Zimbra's latest patch addresses three new vulnerabilities:

โ€ข SQL Injection (CVE-2025-25064) exposing email metadata to authenticated attackers.
โ€ข XSS vulnerability in the Classic Web Client, risking user security.
โ€ข SSRF flaw (CVE-2025-25065) allowing unauthorized redirection to internal systems.

Upgrade ASAP to avoid potential exploitation and secure your systems.

Read: https://thehackernews.com/2025/02/zimbra-releases-security-updates-for.html
๐Ÿ”ฅ13๐Ÿ‘6๐Ÿ˜3โšก1