The Hacker News
โœ”
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ AI tools are the new bait!

Fake ChatGPT & InVideo AI installers are spreading ransomware & destructive malware like CyberLock, Lucky_Gh0$t, and Numero.

Hackers are weaponizing AI hype. Don't trust free tools from shady links.

๐Ÿ”—Details: https://thehackernews.com/2025/05/cybercriminals-target-ai-users-with.html
๐Ÿ˜12๐Ÿคฏ5โšก4๐Ÿ‘4๐Ÿ”ฅ2๐Ÿค”1
๐Ÿšจ Fake News, Real Threats!

Meta just shut down 3 secret influence ops from Iran, China, and Romania using fake accounts, AI, and hashtags to sway public opinion.

๐Ÿ‘โ€๐Ÿ—จ 658 fake Facebook accounts.
๐ŸŽญ AI-generated profiles.

One Iranian campaign tied to Storm-2035 even misused ChatGPT to spread polarizing propaganda.

๐Ÿ”— Read details โ€” https://thehackernews.com/2025/05/meta-disrupts-influence-ops-targeting.html
๐Ÿ˜15๐Ÿ‘8๐Ÿค”2
๐Ÿšจ ConnectWise confirms a targeted cyberattack on its environmentโ€”likely tied to a nation-state actor.

Just weeks after patching CVE-2025-3935, suspicious activity hit a small group of customers.

Stay ALERT | Read details: https://thehackernews.com/2025/05/connectwise-hit-by-cyberattack-nation.html
๐Ÿ‘7๐Ÿ‘2๐Ÿค”1
๐Ÿšจ The U.S. Treasury has sanctioned Funnull, a Philippines-based firm powering thousands of crypto scamsโ€”causing over $200M in U.S. losses.

The twist? They used AWS and Azure to host fake sites at scale.

๐Ÿ”น 332K+ domains
๐Ÿ”น 548 spoofed brands
๐Ÿ”น Avg. victim loss: $150K+

Donโ€™t get played: https://thehackernews.com/2025/05/us-sanctions-funnull-for-200m-romance.html
๐Ÿ”ฅ12๐Ÿ˜3๐Ÿ‘1
UPDATE โ€” Two PoC exploits for the BadSuccessor flaw in Windows Server 2025 are now public.

โš ๏ธ One enables stealthy privilege escalation with just a Kerberos ticket
โš ๏ธ SharpSuccessor lets low-priv users gain domain admin via CreateChild rights

Read: https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html
๐Ÿ˜5๐Ÿคฏ4๐Ÿ‘3
๐Ÿ”ฅ China-backed hackers are on the move.

Earth Lamia is hitting govts, IT firms & universities in ๐Ÿ‡ฎ๐Ÿ‡ณ ๐Ÿ‡ง๐Ÿ‡ท ๐Ÿ‡ป๐Ÿ‡ณ ๐Ÿ‡ต๐Ÿ‡ญ ๐Ÿ‡น๐Ÿ‡ญ using 9 exploitsโ€”incl. SAP NetWeaver & TeamCity.

โš ๏ธ SQL injections
โš ๏ธ Custom malware
โš ๏ธ Ransomwareโ€ฆ then delete it?

Full story ๐Ÿ‘‰ https://thehackernews.com/2025/05/china-linked-hackers-exploit-sap-and.html
๐Ÿ˜14๐Ÿ”ฅ5๐Ÿค”3๐Ÿ˜ฑ3๐Ÿ‘1
๐Ÿ‘€ โ€œWe never drop tools. We use yours.โ€ โ€” BlackBasta ransomware.

A new Bitdefender analysis of 700,000 incidents reveals this chilling truth: 84% of major cyberattacks use Living Off the Land tools like netsh.exe, powershell.exe, wmic.exe.

๐Ÿ”— Read the report: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
๐Ÿ‘16๐Ÿค”6๐Ÿ”ฅ2
โ€œHealthcare loves to walk backwards into the future.โ€ โ€“ Jason Elrod, CISO, MultiCare Health System.

Legacy IT nearly broke care delivery. But with identity-based microsegmentation, Elrod flipped the script:
โœ… 30K staff
โœ… 14 hospitals
โœ… Zero downtime
โœ… 238% ROI

Security shouldn't be a roadblockโ€”it should be a bridge.

See how MultiCare did it โ†’ https://thehackernews.com/2025/05/from-department-of-no-to-culture-of-yes.html
โšก8๐Ÿ‘5
๐Ÿšจ โ€œProve you're not a robotโ€ โ€” turns into full system breach!

Hackers are using fake CAPTCHA checks to deploy a stealthy new Rust malware, EDDIESTEALER, via ClickFixโ€”a social engineering trick abusing PowerShell on Windows.

๐ŸŽฏ Targets: Passwords, crypto wallets, cookies, and more.

๐Ÿ”— Full report: https://thehackernews.com/2025/05/eddiestealer-malware-uses-clickfix.html
๐Ÿคฏ25๐Ÿ˜19๐Ÿ”ฅ4๐Ÿ‘4๐Ÿค”3โšก1
๐Ÿšจ Global cybercrime tool taken down.

On May 27, 2025, U.S., Dutch, and Finnish authorities seized domains like AvCheck[.]net, used by hackers to hide malware from antivirus tools.

๐Ÿ‘€ The twist? These โ€œsecurity checkersโ€ claimed to detect threatsโ€”but were secretly helping cybercriminals stay invisible.

๐Ÿ”— Details: https://thehackernews.com/2025/05/us-doj-seizes-4-domains-supporting.html
๐Ÿ‘26๐Ÿ”ฅ8๐Ÿ‘4๐Ÿ˜4๐Ÿคฏ3โšก1
๐Ÿ” Two Linux flaws let local attackers steal secrets from crash dumps โ€” including password hashes.

Found in Ubuntu, RHEL & Fedora, the bugs (CVE-2025-5054 & CVE-2025-4598) exploit SUID crash handling.

A simple raceโ€”triggered at just the right timeโ€”can leak /etc/shadow data.

PoC is public. Mitigations exist.

Read: https://thehackernews.com/2025/05/new-linux-flaws-allow-password-hash.html
๐Ÿค”16๐Ÿ˜ฑ10๐Ÿ‘7๐Ÿ”ฅ7๐Ÿ‘7๐Ÿคฏ7๐Ÿ˜4โšก3
๐Ÿ‘€ โ€œStrategic Opportunityโ€ or Silent Backdoor?

CFOs across Europe, Africa, & Asia are being hunted in a stealth phishing op impersonating Rothschild recruiters. Victims solve a CAPTCHAโ€”then unknowingly install NetBird & OpenSSH, giving attackers remote access.

Itโ€™s legit software. Weaponized.

Learn more: https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html
๐Ÿ”ฅ29๐Ÿ‘10โšก1
Cyberattacks are getting smarterโ€”not louder.

APTs, AI malware, and browser hijacks are slipping in through trusted tools.

Weโ€™ve cut through the noiseโ€”here are the key exploits, CVEs, and tactics to know.

๐Ÿ”— Read latest weekly recap: https://thehackernews.com/2025/06/weekly-recap-apt-intrusions-ai-malware.html
๐Ÿ”ฅ21๐Ÿ˜6๐Ÿ‘3๐Ÿ‘2๐Ÿค”1
๐Ÿšจ EDR alone wonโ€™t cut it anymore.

Todayโ€™s threats bypass traditional toolsโ€”using stealth, encryption, and insider tactics.

Thatโ€™s why banks, energy firms, and governments are turning to Network Detection & Response (NDR) to catch what SIEM and EDR canโ€™t.

From Volt Typhoon to hidden data theftโ€”NDR sees what others miss.

Find out how โ†’ https://thehackernews.com/2025/06/the-secret-defense-strategy-of-four.html
๐Ÿ‘13๐Ÿ˜3๐Ÿ‘1
๐Ÿšจ Qualcomm just patched 3 zero-days actively exploited in the wildโ€”two rated CVSS 8.6.

โ–ถ CVE-2025-21479
โ–ถ CVE-2025-21480
โ–ถ CVE-2025-27038

๐Ÿ‘€ A twist? Similar bugs were used by spyware vendors like Variston and Cy4Gate.

More here: https://thehackernews.com/2025/06/qualcomm-fixes-3-zero-days-used-in.html
๐Ÿคฏ10๐Ÿ‘8๐Ÿ‘1
๐Ÿšจ JINX-0132 is hijacking DevOps servers for cryptominingโ€”no malware, no staging.

Theyโ€™re exploiting Docker, Gitea, Consul & Nomad (first known wild exploit) using tools straight from GitHub.

๐Ÿ” First known exploit of Nomad misconfigs in the wild
๐Ÿ’ฐ $10K+ in compute stolen/month
๐ŸŒ 5,700+ exposed servers (US, China, EU...)

๐Ÿ”— Full story: https://thehackernews.com/2025/06/cryptojacking-campaign-exploits-devops.html
๐Ÿค”9๐Ÿ‘4๐Ÿคฏ2
๐Ÿšจ WARNING: Another Chrome zero-day exploited in the wild.

Google just patched CVE-2025-5419 โ€” a high-severity V8 engine flaw found by its own Threat Analysis Group.

Attackers are already using it via malicious HTML pages.

Update Chrome NOW | Read: https://thehackernews.com/2025/06/new-chrome-zero-day-actively-exploited.html
๐Ÿ”ฅ25๐Ÿ‘8๐Ÿ‘2
๐Ÿ•ต๏ธโ€โ™‚๏ธ APT29? Cozy Bear? Midnight Blizzard?

Same hacker. Different names.

๐Ÿ”ฅ Microsoft and CrowdStrike are finally fixing the naming mess. Faster attribution. Better defense.

Check it out โ†’ https://thehackernews.com/2025/06/microsoft-and-crowdstrike-launch-shared.html
๐Ÿ˜14๐Ÿ‘5
๐Ÿšจ Chrome to Block TLS Certificates from Two Major Certificate Authorities.

Why? Repeated security failures. Broken promises. No real progress.

Read: https://thehackernews.com/2025/06/google-chrome-to-distrust-two.html

โš ๏ธ Switch CAs now to avoid disruptions.
๐Ÿ”ฅ21๐Ÿ‘5๐Ÿ‘4
๐Ÿšจ New Android malware 'Crocodilus' spreads worldwide.

First seen in Spain & Turkey, it now targets users in ๐Ÿ‡ต๐Ÿ‡ฑ Poland, ๐Ÿ‡ง๐Ÿ‡ท Brazil, ๐Ÿ‡ฆ๐Ÿ‡ท Argentina, ๐Ÿ‡ฎ๐Ÿ‡ณ India & more.

It:
๐Ÿ”ธ Steals crypto seed phrases
๐Ÿ”ธ Poses as " Bank Support " to evade Google alerts
๐Ÿ”ธ Spreads via Facebook ads

๐Ÿ”— Details: https://thehackernews.com/2025/06/android-trojan-crocodilus-now-active-in.html
๐Ÿ‘12๐Ÿ”ฅ4