๐จ Iranian Hacker Pleads Guilty in U.S. Ransomware Case
Sina Gholinejad, 37, admitted to leading Robbinhood ransomware attacks that hit U.S. cities like Baltimore and Greenville between 2019โ2024.
๐ฅ $19M+ in damages
๐ฅ City services shut down for months
๐ฅ Used stolen access + vulnerable drivers to avoid detection
๐ฅ Laundered ransom through crypto mixers
He faces up to 30 years in prison.
๐ Read the full story: https://thehackernews.com/2025/05/iranian-hacker-pleads-guilty-in-19.html
Sina Gholinejad, 37, admitted to leading Robbinhood ransomware attacks that hit U.S. cities like Baltimore and Greenville between 2019โ2024.
๐ฅ $19M+ in damages
๐ฅ City services shut down for months
๐ฅ Used stolen access + vulnerable drivers to avoid detection
๐ฅ Laundered ransom through crypto mixers
He faces up to 30 years in prison.
๐ Read the full story: https://thehackernews.com/2025/05/iranian-hacker-pleads-guilty-in-19.html
๐23๐ฑ12๐ฅ11๐3๐2โก1๐คฏ1
๐จ 0-day Alert: Unpatched flaw threatens 100K+ WordPress sites
A critical vulnerability (CVE-2025-47577, CVSS 10.0) in TI WooCommerce Wishlist lets unauthenticated attackers upload malicious files.
๐ Full details โ https://thehackernews.com/2025/05/over-100000-wordpress-sites-at-risk.html
A critical vulnerability (CVE-2025-47577, CVSS 10.0) in TI WooCommerce Wishlist lets unauthenticated attackers upload malicious files.
๐ Full details โ https://thehackernews.com/2025/05/over-100000-wordpress-sites-at-risk.html
โก9๐6๐ฅ3
๐จ Google Calendarโฆ as malware C2? You read that right.
Chinese APT41 hackers hijacked a govt site to launch a stealth campaign using malware dubbed TOUGHPROGRESSโleveraging Google Calendar events to send commands & exfiltrate data.
Find details here โ https://thehackernews.com/2025/05/chinese-apt41-exploits-google-calendar.html
Chinese APT41 hackers hijacked a govt site to launch a stealth campaign using malware dubbed TOUGHPROGRESSโleveraging Google Calendar events to send commands & exfiltrate data.
Find details here โ https://thehackernews.com/2025/05/chinese-apt41-exploits-google-calendar.html
๐คฏ25๐ฅ9๐3
๐ญ Phishing scams are down 20%โbut donโt celebrate yet.
Hackers are now using GenAI to launch hyper-targeted attacks on HR and finance teams. The game changed. Are your defenses ready for whatโs coming next?
๐ก๏ธ Read the full 2025 report: https://thehackernews.com/expert-insights/2025/05/zscaler-threatlabz-2025-phishing-report.html
Hackers are now using GenAI to launch hyper-targeted attacks on HR and finance teams. The game changed. Are your defenses ready for whatโs coming next?
๐ก๏ธ Read the full 2025 report: https://thehackernews.com/expert-insights/2025/05/zscaler-threatlabz-2025-phishing-report.html
๐9๐4โก2๐คฏ1
๐จ UPDATE: 9,000 ASUS routers hijacked in silent global attack. Hackers gained persistent access using a known flawโno malware, no alerts.
Linked to the same group behind the Cisco honeypot botnet.
The real plan? Itโs just starting... ๐
Read: https://thehackernews.com/2025/05/vicioustrap-uses-cisco-flaw-to-build.html
Linked to the same group behind the Cisco honeypot botnet.
The real plan? Itโs just starting... ๐
Read: https://thehackernews.com/2025/05/vicioustrap-uses-cisco-flaw-to-build.html
๐คฏ10๐ค5๐4โก3๐1
๐จ Hackers hijacked a trusted IT tool to launch ransomware attacks across multiple companies in a supply chain breach.
๐ The twist? Another cyber gang may have quietly opened the door. The ransomware underworld is shifting.
Learn more: https://thehackernews.com/2025/05/dragonforce-exploits-simplehelp-flaws.html
๐ The twist? Another cyber gang may have quietly opened the door. The ransomware underworld is shifting.
Learn more: https://thehackernews.com/2025/05/dragonforce-exploits-simplehelp-flaws.html
๐10๐ฑ4โก3
๐งฌ New Malware Alert: Hides Using Broken File Headers!
Fortinet just uncovered a remote access trojan (RAT) that ran unnoticed for weeksโusing corrupted DOS & PE headers to avoid detection.
๐ฅ๏ธ Turns your PC into a remote access hub
๐ Supports multiple attacker sessions
๐ Uses TLS to stay stealthy
๐ Read the full story: https://thehackernews.com/2025/05/new-windows-rat-evades-detection-for.html
Fortinet just uncovered a remote access trojan (RAT) that ran unnoticed for weeksโusing corrupted DOS & PE headers to avoid detection.
๐ฅ๏ธ Turns your PC into a remote access hub
๐ Supports multiple attacker sessions
๐ Uses TLS to stay stealthy
๐ Read the full story: https://thehackernews.com/2025/05/new-windows-rat-evades-detection-for.html
๐ค11๐5๐ฅ4โก2๐2
At Georgetown, gain the tactical skills to plan for and respond to information security threats. Attend our June 12 webinar.
Sign up now: https://thn.news/cyber-risk-2025-ig
Sign up now: https://thn.news/cyber-risk-2025-ig
๐8๐ฅ2
๐จ AI tools are the new bait!
Fake ChatGPT & InVideo AI installers are spreading ransomware & destructive malware like CyberLock, Lucky_Gh0$t, and Numero.
Hackers are weaponizing AI hype. Don't trust free tools from shady links.
๐Details: https://thehackernews.com/2025/05/cybercriminals-target-ai-users-with.html
Fake ChatGPT & InVideo AI installers are spreading ransomware & destructive malware like CyberLock, Lucky_Gh0$t, and Numero.
Hackers are weaponizing AI hype. Don't trust free tools from shady links.
๐Details: https://thehackernews.com/2025/05/cybercriminals-target-ai-users-with.html
๐12๐คฏ5โก4๐4๐ฅ2๐ค1
๐จ Fake News, Real Threats!
Meta just shut down 3 secret influence ops from Iran, China, and Romania using fake accounts, AI, and hashtags to sway public opinion.
๐โ๐จ 658 fake Facebook accounts.
๐ญ AI-generated profiles.
One Iranian campaign tied to Storm-2035 even misused ChatGPT to spread polarizing propaganda.
๐ Read details โ https://thehackernews.com/2025/05/meta-disrupts-influence-ops-targeting.html
Meta just shut down 3 secret influence ops from Iran, China, and Romania using fake accounts, AI, and hashtags to sway public opinion.
๐โ๐จ 658 fake Facebook accounts.
๐ญ AI-generated profiles.
One Iranian campaign tied to Storm-2035 even misused ChatGPT to spread polarizing propaganda.
๐ Read details โ https://thehackernews.com/2025/05/meta-disrupts-influence-ops-targeting.html
๐15๐8๐ค2
๐จ ConnectWise confirms a targeted cyberattack on its environmentโlikely tied to a nation-state actor.
Just weeks after patching CVE-2025-3935, suspicious activity hit a small group of customers.
Stay ALERT | Read details: https://thehackernews.com/2025/05/connectwise-hit-by-cyberattack-nation.html
Just weeks after patching CVE-2025-3935, suspicious activity hit a small group of customers.
Stay ALERT | Read details: https://thehackernews.com/2025/05/connectwise-hit-by-cyberattack-nation.html
๐7๐2๐ค1
๐จ The U.S. Treasury has sanctioned Funnull, a Philippines-based firm powering thousands of crypto scamsโcausing over $200M in U.S. losses.
The twist? They used AWS and Azure to host fake sites at scale.
๐น 332K+ domains
๐น 548 spoofed brands
๐น Avg. victim loss: $150K+
Donโt get played: https://thehackernews.com/2025/05/us-sanctions-funnull-for-200m-romance.html
The twist? They used AWS and Azure to host fake sites at scale.
๐น 332K+ domains
๐น 548 spoofed brands
๐น Avg. victim loss: $150K+
Donโt get played: https://thehackernews.com/2025/05/us-sanctions-funnull-for-200m-romance.html
๐ฅ12๐3๐1
UPDATE โ Two PoC exploits for the BadSuccessor flaw in Windows Server 2025 are now public.
โ ๏ธ One enables stealthy privilege escalation with just a Kerberos ticket
โ ๏ธ SharpSuccessor lets low-priv users gain domain admin via CreateChild rights
Read: https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html
โ ๏ธ One enables stealthy privilege escalation with just a Kerberos ticket
โ ๏ธ SharpSuccessor lets low-priv users gain domain admin via CreateChild rights
Read: https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html
๐5๐คฏ4๐3
๐ฅ China-backed hackers are on the move.
Earth Lamia is hitting govts, IT firms & universities in ๐ฎ๐ณ ๐ง๐ท ๐ป๐ณ ๐ต๐ญ ๐น๐ญ using 9 exploitsโincl. SAP NetWeaver & TeamCity.
โ ๏ธ SQL injections
โ ๏ธ Custom malware
โ ๏ธ Ransomwareโฆ then delete it?
Full story ๐ https://thehackernews.com/2025/05/china-linked-hackers-exploit-sap-and.html
Earth Lamia is hitting govts, IT firms & universities in ๐ฎ๐ณ ๐ง๐ท ๐ป๐ณ ๐ต๐ญ ๐น๐ญ using 9 exploitsโincl. SAP NetWeaver & TeamCity.
โ ๏ธ SQL injections
โ ๏ธ Custom malware
โ ๏ธ Ransomwareโฆ then delete it?
Full story ๐ https://thehackernews.com/2025/05/china-linked-hackers-exploit-sap-and.html
๐14๐ฅ5๐ค3๐ฑ3๐1
๐ โWe never drop tools. We use yours.โ โ BlackBasta ransomware.
A new Bitdefender analysis of 700,000 incidents reveals this chilling truth: 84% of major cyberattacks use Living Off the Land tools like netsh.exe, powershell.exe, wmic.exe.
๐ Read the report: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
A new Bitdefender analysis of 700,000 incidents reveals this chilling truth: 84% of major cyberattacks use Living Off the Land tools like netsh.exe, powershell.exe, wmic.exe.
๐ Read the report: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
๐16๐ค6๐ฅ2
โHealthcare loves to walk backwards into the future.โ โ Jason Elrod, CISO, MultiCare Health System.
Legacy IT nearly broke care delivery. But with identity-based microsegmentation, Elrod flipped the script:
โ 30K staff
โ 14 hospitals
โ Zero downtime
โ 238% ROI
Security shouldn't be a roadblockโit should be a bridge.
See how MultiCare did it โ https://thehackernews.com/2025/05/from-department-of-no-to-culture-of-yes.html
Legacy IT nearly broke care delivery. But with identity-based microsegmentation, Elrod flipped the script:
โ 30K staff
โ 14 hospitals
โ Zero downtime
โ 238% ROI
Security shouldn't be a roadblockโit should be a bridge.
See how MultiCare did it โ https://thehackernews.com/2025/05/from-department-of-no-to-culture-of-yes.html
โก8๐5
๐จ โProve you're not a robotโ โ turns into full system breach!
Hackers are using fake CAPTCHA checks to deploy a stealthy new Rust malware, EDDIESTEALER, via ClickFixโa social engineering trick abusing PowerShell on Windows.
๐ฏ Targets: Passwords, crypto wallets, cookies, and more.
๐ Full report: https://thehackernews.com/2025/05/eddiestealer-malware-uses-clickfix.html
Hackers are using fake CAPTCHA checks to deploy a stealthy new Rust malware, EDDIESTEALER, via ClickFixโa social engineering trick abusing PowerShell on Windows.
๐ฏ Targets: Passwords, crypto wallets, cookies, and more.
๐ Full report: https://thehackernews.com/2025/05/eddiestealer-malware-uses-clickfix.html
๐คฏ25๐19๐ฅ4๐4๐ค3โก1
๐จ Global cybercrime tool taken down.
On May 27, 2025, U.S., Dutch, and Finnish authorities seized domains like AvCheck[.]net, used by hackers to hide malware from antivirus tools.
๐ The twist? These โsecurity checkersโ claimed to detect threatsโbut were secretly helping cybercriminals stay invisible.
๐ Details: https://thehackernews.com/2025/05/us-doj-seizes-4-domains-supporting.html
On May 27, 2025, U.S., Dutch, and Finnish authorities seized domains like AvCheck[.]net, used by hackers to hide malware from antivirus tools.
๐ The twist? These โsecurity checkersโ claimed to detect threatsโbut were secretly helping cybercriminals stay invisible.
๐ Details: https://thehackernews.com/2025/05/us-doj-seizes-4-domains-supporting.html
๐26๐ฅ8๐4๐4๐คฏ3โก1
๐ Two Linux flaws let local attackers steal secrets from crash dumps โ including password hashes.
Found in Ubuntu, RHEL & Fedora, the bugs (CVE-2025-5054 & CVE-2025-4598) exploit SUID crash handling.
A simple raceโtriggered at just the right timeโcan leak /etc/shadow data.
PoC is public. Mitigations exist.
Read: https://thehackernews.com/2025/05/new-linux-flaws-allow-password-hash.html
Found in Ubuntu, RHEL & Fedora, the bugs (CVE-2025-5054 & CVE-2025-4598) exploit SUID crash handling.
A simple raceโtriggered at just the right timeโcan leak /etc/shadow data.
PoC is public. Mitigations exist.
Read: https://thehackernews.com/2025/05/new-linux-flaws-allow-password-hash.html
๐ค16๐ฑ10๐7๐ฅ7๐7๐คฏ7๐4โก3
๐ โStrategic Opportunityโ or Silent Backdoor?
CFOs across Europe, Africa, & Asia are being hunted in a stealth phishing op impersonating Rothschild recruiters. Victims solve a CAPTCHAโthen unknowingly install NetBird & OpenSSH, giving attackers remote access.
Itโs legit software. Weaponized.
Learn more: https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html
CFOs across Europe, Africa, & Asia are being hunted in a stealth phishing op impersonating Rothschild recruiters. Victims solve a CAPTCHAโthen unknowingly install NetBird & OpenSSH, giving attackers remote access.
Itโs legit software. Weaponized.
Learn more: https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html
๐ฅ29๐10โก1