This week's ThreatsDay looks at big cyber news from around the world:
πΉ Russian hackers got arrested
πΉ Chinese spies are using LinkedIn to find secrets
πΉ People caught washing dirty money with crypto
πΉ New hidden bugs found in phones, computers, and smart home gadgets
πΉ ... and many more.
π Zero-day attacks β’ Spying β’ Crypto crime β’ Bugs in everyday devices β’ Moving malware
Read all critical stories here β https://thehackernews.com/2025/11/threatsday-bulletin-0-days-linkedin.html
πΉ Russian hackers got arrested
πΉ Chinese spies are using LinkedIn to find secrets
πΉ People caught washing dirty money with crypto
πΉ New hidden bugs found in phones, computers, and smart home gadgets
πΉ ... and many more.
π Zero-day attacks β’ Spying β’ Crypto crime β’ Bugs in everyday devices β’ Moving malware
Read all critical stories here β https://thehackernews.com/2025/11/threatsday-bulletin-0-days-linkedin.html
π₯8π2
JSGuLdr: Multi-Stage Loader Delivering PhantomStealer
#ANYRUN researchers identified #JSGuLdr, a multi-stage JavaScript-to-PowerShell loader used to deliver #PhantomStealer. A JScript file triggers PowerShell through an Explorer COM call, pulls the second stage from %APPDATA%\Registreri62, then uses Net.WebClient to fetch an encrypted payload from Google Drive into %APPDATA%\Autorise131[.]Tel. The payload is decoded in memory and loaded, with PhantomStealerinjected into msiexec.exe.
Execution chain: wscript.exe β‘οΈ explorer.exe (svchost.exe) β‘οΈ explorer.exe (COM) β‘οΈ powershell.exe β‘οΈ msiexec.exe
π See analysis session: https://app.any.run/tasks/7b295f6f-5f16-4a44-a02b-5d59fd4b1e8f?utm_source=tg_thehackernews&utm_medium=post&utm_campaign=techpost&utm_content=task&utm_term=201125
π Read full analysis: https://t.iss.one/anyrun_app/698
#ANYRUN researchers identified #JSGuLdr, a multi-stage JavaScript-to-PowerShell loader used to deliver #PhantomStealer. A JScript file triggers PowerShell through an Explorer COM call, pulls the second stage from %APPDATA%\Registreri62, then uses Net.WebClient to fetch an encrypted payload from Google Drive into %APPDATA%\Autorise131[.]Tel. The payload is decoded in memory and loaded, with PhantomStealerinjected into msiexec.exe.
Execution chain: wscript.exe β‘οΈ explorer.exe (svchost.exe) β‘οΈ explorer.exe (COM) β‘οΈ powershell.exe β‘οΈ msiexec.exe
π See analysis session: https://app.any.run/tasks/7b295f6f-5f16-4a44-a02b-5d59fd4b1e8f?utm_source=tg_thehackernews&utm_medium=post&utm_campaign=techpost&utm_content=task&utm_term=201125
π Read full analysis: https://t.iss.one/anyrun_app/698
β‘7π3π1
WhatsApp accounts are being hijacked worldwide via fake WhatsApp Web pages that mimic the official interface exactly β including auto-detected language and country flag.
You scan QR or type code β they take your account β message your friends for money + steal everything.
Check the new CTM360 report β see exactly how the fake pages look and how to stay safe β https://thehackernews.com/2025/11/ctm360-exposes-global-whatsapp.html
You scan QR or type code β they take your account β message your friends for money + steal everything.
Check the new CTM360 report β see exactly how the fake pages look and how to stay safe β https://thehackernews.com/2025/11/ctm360-exposes-global-whatsapp.html
π12π€―4π2π1
Hackers made a new botnet called Tsundere β itβs spreading through fake game downloads like Valorant and CS2.
It hides its servers on the Ethereum blockchain, making it almost impossible to shut down.
Researchers say itβs still active.
Read more β https://thehackernews.com/2025/11/tsundere-botnet-expands-using-game.html
It hides its servers on the Ethereum blockchain, making it almost impossible to shut down.
Researchers say itβs still active.
Read more β https://thehackernews.com/2025/11/tsundere-botnet-expands-using-game.html
π±17β‘5π2
π¨ Hackers are exploiting a 2-year-old authentication flaw (CVE-2023-48022) in the Ray AI framework to take over NVIDIA GPU clusters and run a self-spreading crypto-mining botnet called ShadowRay 2.0.
The bug remains unpatched by design, and over 230,000 Ray servers are exposed online.
Read about it here β https://thehackernews.com/2025/11/shadowray-20-exploits-unpatched-ray.html
The bug remains unpatched by design, and over 230,000 Ray servers are exposed online.
Read about it here β https://thehackernews.com/2025/11/shadowray-20-exploits-unpatched-ray.html
π15π₯5
π¨ ThreatsDay Bulletin β The EU wants to rewrite its privacy rules.
New proposal would let companies use personal data to train AI without consent, if done for βlegitimate interest.β
Critics say itβs a major rollback of GDPR and a win for Big Tech.
Read more β https://thehackernews.com/2025/11/threatsday-bulletin-0-days-linkedin.html#eu-rewires-privacy-playbook
New proposal would let companies use personal data to train AI without consent, if done for βlegitimate interest.β
Critics say itβs a major rollback of GDPR and a win for Big Tech.
Read more β https://thehackernews.com/2025/11/threatsday-bulletin-0-days-linkedin.html#eu-rewires-privacy-playbook
π±11π4π€―4
π¨ Salesforce found unusual activity in Gainsight apps and cut off their access.
Hackers linked to ShinyHunters may have used those apps to steal Salesforce data from nearly 1,000 companies.
Gainsight was also hit in a similar attack earlier this year.
Full story β https://thehackernews.com/2025/11/salesforce-flags-unauthorized-data.html
Hackers linked to ShinyHunters may have used those apps to steal Salesforce data from nearly 1,000 companies.
Gainsight was also hit in a similar attack earlier this year.
Full story β https://thehackernews.com/2025/11/salesforce-flags-unauthorized-data.html
π6π3π€―1
βοΈ The SEC just ended its case against SolarWinds β the company hit by the big 2020 hack.
After two years of blaming its security chief, the case was quietly dropped.
Now many wonder if anyone will be held responsible next time β https://thehackernews.com/2025/11/sec-drops-solarwinds-case-after-years.html
After two years of blaming its security chief, the case was quietly dropped.
Now many wonder if anyone will be held responsible next time β https://thehackernews.com/2025/11/sec-drops-solarwinds-case-after-years.html
π9π3π₯3π1
β οΈ A hacking group linked to China just pulled a big one.
They used a marketing firmβs code to infect 1,000+ websites with a fake π Chrome update.
Click it β and you get BADAUDIO, new malware made to spy for months.
Full story β https://thehackernews.com/2025/11/apt24-deploys-badaudio-in-years-long.html
They used a marketing firmβs code to infect 1,000+ websites with a fake π Chrome update.
Click it β and you get BADAUDIO, new malware made to spy for months.
Full story β https://thehackernews.com/2025/11/apt24-deploys-badaudio-in-years-long.html
π₯11π4π3π€―2
Every phone could be a way in for hackers.
Samsung Galaxy devices check their security before they connect to your network.
That means real Zero Trustβbuilt into the device itself.
Read β https://thehackernews.com/2025/11/why-it-admins-choose-samsung-for-mobile.html
Samsung Galaxy devices check their security before they connect to your network.
That means real Zero Trustβbuilt into the device itself.
Read β https://thehackernews.com/2025/11/why-it-admins-choose-samsung-for-mobile.html
π10π€5π4
π¨ Google just made Android and iPhone share files directly using Quick Share and AirDrop.
Itβs built in Rust for stronger security, and a small info leak found in testing is already fixed.
Full details β https://thehackernews.com/2025/11/google-adds-airdrop-compatibility-to.html
Itβs built in Rust for stronger security, and a small info leak found in testing is already fixed.
Full details β https://thehackernews.com/2025/11/google-adds-airdrop-compatibility-to.html
π₯19π7π6π€2π€―2
π¨ Grafana fixed a major security bug (CVSS 10.0) that could let attackers sign in as admin users.
It affects Grafana Enterprise 12.0.0β12.2.1 if SCIM provisioning is turned on β a number like β1β could trick the system into giving admin access.
Update now to stay safe. Read more β https://thehackernews.com/2025/11/grafana-patches-cvss-100-scim-flaw.html
It affects Grafana Enterprise 12.0.0β12.2.1 if SCIM provisioning is turned on β a number like β1β could trick the system into giving admin access.
Update now to stay safe. Read more β https://thehackernews.com/2025/11/grafana-patches-cvss-100-scim-flaw.html
π26π1
π¨ CISA warns Oracle Identity Manager flaw (CVE-2025-61757) is under active attack.
Hackers can run code without login by adding ?WSDL or ;.wadl to URLs β a tiny trick that opens locked systems.
Exploited since August. Patch by Dec 12.
Full details β https://thehackernews.com/2025/11/cisa-warns-of-actively-exploited.html
Hackers can run code without login by adding ?WSDL or ;.wadl to URLs β a tiny trick that opens locked systems.
Exploited since August. Patch by Dec 12.
Full details β https://thehackernews.com/2025/11/cisa-warns-of-actively-exploited.html
π12π€―1
π¨ Hackers found a new way to phish β through browser notifications.
A new tool called Matrix Push C2 lets attackers send fake alerts that look like real ones from PayPal, Netflix, or TikTok.
No downloads. No malware file. Just one click β and your dataβs theirs.
Learn more β https://thehackernews.com/2025/11/matrix-push-c2-uses-browser.html
A new tool called Matrix Push C2 lets attackers send fake alerts that look like real ones from PayPal, Netflix, or TikTok.
No downloads. No malware file. Just one click β and your dataβs theirs.
Learn more β https://thehackernews.com/2025/11/matrix-push-c2-uses-browser.html
π₯29π9
π¨ Chinaβs hacker group APT31 broke into Russiaβs IT companies β and stayed hidden for almost two years.
They used Yandex Cloud, OneDrive, and even social media to steal data without raising alarms.
Some attacks ran on holidays when no one was watching.
Details β https://thehackernews.com/2025/11/china-linked-apt31-launches-stealthy.html
They used Yandex Cloud, OneDrive, and even social media to steal data without raising alarms.
Some attacks ran on holidays when no one was watching.
Details β https://thehackernews.com/2025/11/china-linked-apt31-launches-stealthy.html
π₯66π€―30π20π6π€3π2π±1
π¨ Hackers are using a fixed Windows bug (CVE-2025-59287) to spread ShadowPad malware through WSUS servers.
They used normal Windows tools like curl and certutil to install it β a method seen before in Chinese hacking groups.
Systems patched too late may have already been compromised.
Full story β https://thehackernews.com/2025/11/shadowpad-malware-actively-exploits.html
They used normal Windows tools like curl and certutil to install it β a method seen before in Chinese hacking groups.
Systems patched too late may have already been compromised.
Full story β https://thehackernews.com/2025/11/shadowpad-malware-actively-exploits.html
π6π2π2
π΄ Researchers say Chinaβs DeepSeek-R1 AI writes weaker code when asked about topics like Tibet or Uyghurs.
Coding mistakes go up by about 50%, even when the topic isnβt part of the task.
This bias could be a new security risk.
Full story β https://thehackernews.com/2025/11/chinese-ai-model-deepseek-r1-generates.html
Coding mistakes go up by about 50%, even when the topic isnβt part of the task.
This bias could be a new security risk.
Full story β https://thehackernews.com/2025/11/chinese-ai-model-deepseek-r1-generates.html
π22π₯7β‘3π€2
β‘ Another week, another wave of exploits, leaks, and surprise fixes.
Whatβs real, whatβs risky, whatβs next β itβs all in the Cybersecurity Recap π
https://thehackernews.com/2025/11/weekly-recap-fortinet-exploit-chrome-0.html
Whatβs real, whatβs risky, whatβs next β itβs all in the Cybersecurity Recap π
https://thehackernews.com/2025/11/weekly-recap-fortinet-exploit-chrome-0.html
π₯5π2
π₯ New npm attack DETECTED!
A campaign dubbed βSha1-Hulud: The Second Comingβ has compromised hundreds of packages and over 25,000 GitHub repos.
The code runs during install, steals cloud logins, and if that fails, it deletes the userβs home folder.
Read more β https://thehackernews.com/2025/11/second-sha1-hulud-wave-affects-25000.html
A campaign dubbed βSha1-Hulud: The Second Comingβ has compromised hundreds of packages and over 25,000 GitHub repos.
The code runs during install, steals cloud logins, and if that fails, it deletes the userβs home folder.
Read more β https://thehackernews.com/2025/11/second-sha1-hulud-wave-affects-25000.html
π11π€―6π€2
π¨ Fluent Bit β deployed over 15 Billion times β just got hit with 5 critical CVEs.
Attackers can exploit them to run code, rewrite or delete logs, and fake telemetry across AWS, GCP & Azure.
Some of these bugs have been in Fluent Bit for over 8 years.
More details β https://thehackernews.com/2025/11/new-fluent-bit-flaws-expose-cloud-to.html
Attackers can exploit them to run code, rewrite or delete logs, and fake telemetry across AWS, GCP & Azure.
Some of these bugs have been in Fluent Bit for over 8 years.
More details β https://thehackernews.com/2025/11/new-fluent-bit-flaws-expose-cloud-to.html
π12π₯3π€―2π1