FBI, CISA Urge Memory-Safe Practices for Software Development 

Software Development 

In a strongly worded advisory, the FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have urged software developers to cease unsafe development practices that lead to “unforgivable” buffer overflow vulnerabilities. 

“Despite the existence of well-documented, effective mitigations for buffer overflow vulnerabilities, many manufacturers continue to use unsafe software development practices that allow these vulnerabilities to persist,” the agencies said in the February 12 Secure By Design alert. “For these reasons—as well as the damage exploitation of these defects can cause—CISA, FBI, and others designate buffer overflow vulnerabilities as unforgivable defects.” 

The agencies said threat actors leverage buffer overflow vulnerabilities to gain initial access to networks, thus making them a critical point for preventing attacks. 

We’ll look at the prevalence of buffer overflow vulnerabilities, some examples cited by CISA and the FBI, and guidance for secure development and use of memory-safe programming languages. 

Buffer Overflow Vulnerabilities: Prevalence and Examples 

The FBI-CISA guidance specifically mentions the common software weaknesses CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), along with stack-based buffer overflows (CWE-121) and heap-based buffer overflows (CWE-122). 

The phrase “buffer overflow” occurs in 67 of the 1270 vulnerabilities in CISA’s Known Exploited Vulnerabilities (KEV) catalog, or 5.28% of the KEV database. The words “buffer” and “overflow” occur in 84 of the KEV vulnerabilities (6.6%). 

CISA and the FBI cited six examples of buffer overflow vulnerabilities in IT products: 

  • CVE-2025-21333, a Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege vulnerability 
  • CVE-2025-0282, a stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 
  • CVE-2024-49138, a Windows Common Log File System Driver Elevation of Privilege vulnerability 
  • CVE-2024-38812, a VMware vCenter Server heap-overflow vulnerability 
  • CVE-2023-6549, an Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Citrix Systems’ NetScaler ADC and NetScaler Gateway 
  • CVE-2022-0185, a heap-based buffer overflow flaw in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length (the CWE in this case was CWE-190, Integer Overflow or Wraparound). 

“These vulnerabilities can lead to data corruption, sensitive data exposure, program crashes, and unauthorized code execution,” the agency guidance said. “Threat actors frequently exploit these vulnerabilities to gain initial access to an organization’s network and then move laterally to the wider network.” 

They added that “the use of unsafe software development practices that allow the persistence of buffer overflow vulnerabilities—especially the use of memory-unsafe programming languages—poses unacceptable risk to our national and economic security.” 

Memory-Safe Software Development 

The agencies urged manufacturers “to take immediate action to prevent these vulnerabilities from being introduced into their products. … Software manufacturer senior executives and business leaders should ask their product and development teams to document past buffer overflow vulnerabilities and how they are working to eliminate this class of defect.” 

Customers should hold manufacturers accountable by requesting a Software Bill of Materials (SBOM) and a secure software development attestation, the FBI and CISA said. 

For development teams, the agencies recommended the following secure by design practices to prevent buffer overflow vulnerabilities: 

  • Memory-safe languages should be used whenever possible “to shift the burden of memory management from the developer to the programming language’s built-in safety features.” They added that developers should never disable or override memory safety guarantees in languages when it’s possible to do so, and that using a memory-safe language in one part of a software package will not fix memory-unsafe code in other libraries. 

  • A phased transition plan for implementing memory-safe languages should be used for upgrading existing codebases while using technologies to limit memory vulnerabilities in existing code. “Ideally, this plan should include using memory-safe languages to develop new code and—over time and when feasible—transition their software’s most highly privileged/exposed code to memory-safe languages,” the agencies said. 

  • Enable compiler flags that implement compile time and runtime protections against buffer overflows to the extent that application performance allows, and “implement canaries that alert if an overflow occurs.” 

  • Conduct unit tests with an instrumented toolchain such as AddressSanitizer and MemorySanitizer that checks source code for buffer overflows and other memory safety issues. 

  • Perform adversarial product testing that includes static analysis, fuzzing, and manual reviews to ensure code safety and quality throughout the development lifecycle. 

  • Publish amemory-safety roadmap that outlines plans to develop new products with memory-safe languages and to migrate older ones based on risk. 

  • Conduct root cause analysis of past vulnerabilities, including buffer overflows,to identify patterns. “Where possible, take actions to eliminate entire classes of vulnerabilities across products, rather than the superficial causes,” the agencies said. 

The alert said eliminating buffer overflow vulnerabilities “can help reduce the prevalence of other memory safety issues, such as format string, off-by-one, and use-after-free vulnerabilities.” 

Conclusion 

As an initial entry point for attackers into a network, the importance of buffer overflow vulnerability prevention can’t be overstated. Development teams would be wise to implement CISA and the FBI’s advice to the maximum extent possible. 

Customers also have a role to play by demanding memory-safe documentation from suppliers. But they also shouldn’t neglect basic cybersecurity practices for the eventual vulnerabilities that will slip past even the most vigilant development teams. Zero trust, risk-based vulnerability management, segmentation, tamper-proof backups and network and endpoint monitoring are all critically important practices for limiting the damage from any cyberattacks that do occur. 

The post FBI, CISA Urge Memory-Safe Practices for Software Development  appeared first on Cyble.

Blog – Cyble – ​Read More

Changing the narrative on pig butchering scams

Changing the narrative on pig butchering scams

Welcome to this week’s edition of the Threat Source Newsletter.

Love is in the air this week. Wait, is that love? Or is it some tech bro with a housing development company (that would totally love to meet in person but can’t this week) emailing you about an investment opportunity in his cryptocurrency scheme?

You may be seeing a lot of ‘Beware of romance/ pig butchering scams’ articles around Valentines Day. This isn’t really one of those. Although, if said tech bro initiates a course of love bombing mixed in with wire transfer requests, report that dude quicker than the roadrunner declares “meep meep”. 

I recently came across an article on The Hacker News that talked about how Interpol is pushing for a “linguistic shift” when it comes to pig butchering scams. They’re advocating for the term to be replaced by ‘romance baiting’.

In a statement, Interpol explained their reasoning:

“The term ‘pig butchering’ dehumanizes and shames victims of such frauds, deterring people from coming forward to seek help and provide information to the authorities,”

Pig butchering originates from a Chinese phrase. Its meaning is derived from “fattening a pig before the slaughter”. When we put that in the context of online scams, the emphasis is on the victim, with some not so nice connotations (and a certain sense of inevitability attached to it). 

By flipping the script and renaming pig butchering as romance baiting, Interpol suggests this could have a positive effect on the psychological nature of being targeted:

“Words matter. We’ve seen this in the areas of violent sexual offences, domestic abuse, and online child exploitation. We need to recognize that our words also matter to the victims of fraud,” INTERPOL Acting Executive Director of Police Services Cyril Gout said.

“It’s time to change our language to prioritize respect and empathy for the victims, and to hold fraudsters accountable for their crimes.”

I wholeheartedly agree. Victim blaming only causes more harm. The more we can do to encourage people to report perpetrators, without feeling a sense of shame, the better. 

What do you think? Will you be changing the narrative the next time you talk about romance scams? Are there any other terms in our industry that potentially put more focus on the victim than the adversary?

Newsletter reader survey

We want your feedback! Tell us your thoughts and five lucky readers will receive Talos Swag boxes.

Launch survey

The one big thing

In the latest Talos Vulnerability Deep Dive, the team picked out something that had caught their attention during an earlier investigation of the macOS printing subsystem: IPP over USB specification, which defines how printers that are available over USB can only still support network printing via Internet Printing Protocol (IPP). During this new investigation, Talos decided to look at how other operating systems handle the same functionality. 

The result? Some pretty good news actually. Although the potential vulnerability Talos discusses in this article is very real, mitigating circumstances make it less severe. The vulnerability is discovered and made unexploitable by modern compiler features, and we are highlighting this as a rare win.

Why do I care?

We often hear of all the failings of software and vulnerabilities and mitigation bypasses, and we felt we should take this opportunity to highlight the opposite. In this case, modern compiler features, static analysis via -Wstringop-overflow and strong mitigation via FORTIFY_SOURCE, saved the day.

So now what?

The modern compiler features detailed above should always be enabled by default. Additionally, those compiler warnings are only useful if someone actually reads them. Check out this excellent write up of the vulnerability, and the proof of concept.

Top security headlines of the week

Lawmakers unite to push forward Cyber Force: “A group of House lawmakers are working to keep the idea of creating a Cyber Force at the Pentagon a top cyber policy topic on Capitol Hill this year.” (Politico).

Authorities Disrupt 8Base Ransomware: “The 8Base ransomware group’s infrastructure has been disrupted and leaders have been arrested in an international law enforcement operation, Europol announced.” (Security Week)

Magecart Attackers Abuse Google Ad Tool to Steal Data: “Attackers are smuggling payment card-skimming malicious code into checkout pages on Magento-based e-commerce sites by abusing the Google Tag Manager ad tool.” (Dark Reading).

Update to iOS 18.3.1 Right Now. There’s a ‘Sophisticated Attack’ Risk, Apple Says: “A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.” (Vice).

Can’t get enough Talos?

Google Cloud Platform Data Destruction via Cloud Build

Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024 

Catch up on the latest Talos Takes podcast:

Upcoming events where you can find Talos

RSA (April 28-May 1, 2025)
San Francisco, CA

TIPS 2025 (May 14-15, 2025)
Arlington, VA

Most prevalent malware files from Talos telemetry over the week

SHA 256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507 

MD5: 2915b3f8b703eb744fc54c81f4a9c67f 

VirusTotal: https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507 

Typical Filename: VID001.exe 

Claimed Product: N/A 

Detection Name: Win.Worm.Coinminer::1201 

 

SHA256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91
MD5: 7bdbd180c081fa63ca94f9c22c457376
VirusTotal: https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91

Typical Filename: c0dwjdi6a.dll


Claimed Product: N/A


Detection Name: Trojan.GenericKD.33515991

 

SHA256:47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca 

MD5: 71fea034b422e4a17ebb06022532fdde 

VirusTotal: https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca 

Typical Filename: VID001.exe 

Claimed Product: n/a  

Detection Name: Coinminer:MBT.26mw.in14.Talos 

 

SHA256:873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f  

MD5: d86808f6e519b5ce79b83b99dfb9294d   

VirusTotal: 

https://www.virustotal.com/gui/file/873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f 

Typical Filename: n/a  

Claimed Product: n/a   

Detection Name: Win32.Trojan-Stealer.Petef.FPSKK8   

 

SHA-256: 6adbdd262a335eb59c55ca1c8b21efc1cc5a8bf0f8f5662e78fd9f00141feed1

MD5: 35f8db3dde368c6d25239d27fd79a4a7

VirusTotal: https://www.virustotal.com/gui/file/6adbdd262a335eb59c55ca1c8b21efc1cc5a8bf0f8f5662e78fd9f00141feed1/details

Typical Filename: n/a  

Claimed Product: n/a   

Detection Name: easysmartpdf.msi

Cisco Talos Blog – ​Read More

Protecting WhatsApp and Telegram accounts from hacking and hijacking in 2025 | Kaspersky official blog

Cybercriminals around the world keep honing their schemes to steal accounts in WhatsApp, Telegram, and other popular messaging apps – and any of us could fall for their scams. Only by becoming a victim of such an attack can you fully appreciate how vital a tool instant messaging has become, and how diverse the damage from hacking a WhatsApp or Telegram account may be. But better not to let it come to that, and to learn to recognize key hijacking scams in order to prevent them in time.

Why hijack your WhatsApp or Telegram account?

A stolen account can be appealing because of its content, access rights, or simply the fact that it’s verified, linked to a phone number, and has a good reputation. Having stolen your Telegram or WhatsApp account, cybercriminals can use it in a variety of ways:

  • To send spam and phishing messages on your behalf to all your contacts – including private channels and communities.
  • To write sob stories to all your friends asking for money. Worse yet – to use AI to fake a voice or video message asking for help.
  • To steal accounts from your friends and family by asking them to vote in a contest, “gifting” them a fake Telegram Premium subscription, or employing some other fraudulent scheme – of which there are many. Coming from someone the recipient knows, messages like this tend to inspire greater trust.
  • To hijack a Telegram channel or WhatsApp community you manage.
  • To blackmail you with the contents of your chats – especially if there’s sexting or other compromising messages.
  • To read your chats quietly, which may have strategic value if you’re a businessman, politician, military or security officer, or civil servant.
  • To upload a new photo to your account, change your name, and use your account for targeted scams: from flirting with crypto investors (pig butchering) to requests from the victim’s boss (boss scams).

Due to this variety of applications, criminals need new accounts all the time, and anyone can become a victim.

WhatsApp, Telegram, and QQ quishing

Scammers used to steal accounts by tricking people into giving them text verification codes (required to log in), or by intercepting these codes. But since this method is no longer as effective, the focus has shifted to trying to link an additional device to the victim’s account. This works best when using phishing schemes based on QR codes – known as quishing.

Attackers either put up their own ads or carefully stick malicious QR codes on top of someone else’s to overlay the legitimate code. They can also print a QR code on a flyer and drop it in a mailbox, post it on a social network or website, or simply send it by email. The pretext can be anything: an invitation to join a neighborhood chat; connect to an office, campus, or school community; download a restaurant menu or claim a discount; or view cinema showtimes or extra information on movies and other events.

The code alone can’t cause your account to be hijacked, but it can lure you to a scam website containing detailed instructions telling you where to click in the messaging app, and what to do after that. The site shows you another, dynamically generated, QR code, which the attackers’ server requests from WhatsApp or Telegram when it asks the service to link a new device to your account. And if you, determined to enjoy every benefit civilization has to offer, decide that another code won’t hurt and follow the instructions, then the device used by the attackers will get access to all your data in the app. In fact, you can see it in the “Devices” or “Linked devices” sections of Telegram or WhatsApp, respectively. However, this attack is designed for those who aren’t very familiar with messaging app settings, and who might not check such submenus regularly. Incidentally, users of QQ, China’s most popular messaging app, are also targeted by similar attacks.

Malicious polls, fraudulent gifts, and girls… undressing

Aside from QR codes, scammers may also attack you by sending seemingly harmless links, such as those for “people’s choice” votes, instant lotteries, or giveaways. On Telegram, they like to mimic the interface used for receiving a Premium subscription as a gift.

Typically, you get to such pages through messages from friends or acquaintances whose accounts have already been compromised by the same scammers. The homepage is always full of catchy phrases like “vote for me” and “claim your gift”.

A variation on the scam involves messages from a “messaging app security service”. You might get contacted by someone using a name like “Security” or “Telegram security team”. They offer to protect your data by transferring your account to a secure account clicking a link and enabling “advanced security options”.

Lastly, you could get an ad for a service or bot that offers something useful or fun – like an AI chatbot or a… nude generator.

There’s another potential scam scenario for Telegram: since 2018, the service has offered website owners authentication of visitors using the Telegram Login Widget. It’s a real, functioning system, but scammers take advantage of the fact that few people know how this authentication is supposed to work – replacing it with a phishing page to steal information.

In any of these scenarios, once you’re through the enticing landing page, you’ll be asked to “sign in to your messaging app”. This procedure might involve scanning a QR code or simply entering your phone number and the OTP code on the website. This part of the website is typically disguised as a standard WhatsApp or Telegram authentication interface – creating the illusion that you’ve been redirected to the official website for login. In reality, the entire process is happening on the attackers’ own site. If you comply and enter the data or scan the code, cybercriminals will immediately gain control of your messaging app account. Your only reward? Some kind of thank-you message like your premium subscription will activate within 24 hours (it won’t; who knew?!).

Hacking a smartphone with a fake WhatsApp or Telegram app

An old yet still effective way to hijack accounts is by using trojanized mods; that is – modified versions of messaging apps. This threat is especially relevant for Android users. You can come across ads touting “improved” versions of popular messaging apps on forums, in groups chats, or simply in search results. WhatsApp mods often promise the ability to read deleted messages and see the statuses of those who hid them, while Telegram fans are promised free Premium features.

Downloading and installing a mod like this infects your phone with malware that can steal the messaging account along with all the other data on the device. Interestingly, Android users can encounter spyware-infected mods even in the “holy of holies”: the official Google Play store.

What happens to a hijacked Telegram or WhatsApp account?

The fate of your hijacked account depends on the attackers’ intentions. If their goal is espionage or blackmail, they’ll just quickly download all your chats for analysis, and you may not notice anything at all.

If cybercriminals want to send fraudulent messages to your contacts, they’ll immediately delete sent messages by using the “delete for me only” feature to make sure you don’t notice anything for as long as possible. However, sooner or later, you’ll start receiving messages from surprised, outraged, or simply vigilant friends, or you yourself will notice traces of an unauthorized presence.

Another consequence of hacking may be the messaging service’s reaction to the spam. If recipients report your messages, your account may become restricted or blocked – preventing you from sending messages for several hours or days. You can appeal the restrictions by using a special button, such as “Request a Review” in the message from the moderators, but it’s best to first ensure that you have exclusive control over your account and wait at least a few hours afterward.

Telegram treats all devices linked to an account equally, which means scammers can take over your entire account and kick you out by disconnecting all your devices. However, to do this, they’d need to remain logged in unnoticed for a whole day: Telegram has a 24-hour waiting period before one can log out other devices from a newly connected account. If you’ve been locked out of your own Telegram account, read our detailed recovery guide.

On WhatsApp, the first device you use to log in to your account becomes the primary one, and other devices are secondary. This means hackers can’t pull off that trick there.

How to protect yourself from WhatsApp and Telegram account hijacking

You can find detailed instructions on how to secure your Telegram, WhatsApp, Signal, and Discord in our separate guides. Let’s go over the general principles again:

  • Be sure to enable two-factor authentication (also variously known as “cloud password” or “two-step verification”) in the messaging app, and use a long, complex, and unique password or passphrase.
  • On WhatsApp, you can choose a passkey instead of a password. This protection is more reliable.
  • Avoid taking part in giveaways and lotteries. Don’t accept gifts that you didn’t expect – especially if you need to log in to some websites through the messaging app to receive them.
  • Learn how legitimate authorization through Telegram looks, and immediately close any websites that look different. To put it simply, during a legitimate authorization process, all you need to do is click the “Yes, I want to go to such-and-such website” button within the Telegram chat with the bot. No scanning or entering of codes is required.
  • Check your WhatsApp and Telegram settings regularly to see what devices are connected. Disconnect any that look old or fishy.
  • Always use official messaging apps downloaded from trusted sources like Google Play or the App Store, Galaxy Store, Huawei AppGallery, and other major app stores.
  • Be more careful with desktop messaging clients – especially at the office.
  • Use a reliable protection system on all your devices to avoid visiting phishing sites or installing malware.

Kaspersky official blog – ​Read More

Threat Intelligence Reports: Get Fresh Research on the Latest Cyber Attacks and APTs

ANY.RUN proudly presents Threat Intelligence Reports: investigative reports on cyber threats and attacks focused on delivering actionable insights to security professionals and decision makers.   

Manually composed by our experienced analysts, the Reports provide data for threat monitoring and detection, incident mitigation and response, R&D, education, strategic planning and compliance. 
 
These detailed attack overviews are based on comprehensive research of cyber threats, including malware, ransomware, phishing campaigns, and other malicious activities. APTs and cybercriminal groups are under special scrutiny as one of the most critical and persistent hazards to organizations and individuals.  

How to Get TI Reports 

Discover TI Reports at intelligence.any.run

TI Lookup’s paid customers get access to detailed reports with comprehensive intelligence data. For a wider audience, summaries on actors and threats are available. Some reports are also fully available for free.  
 
Reach the reports in 3 easy steps:  

1. Visit TI Lookup’s main page at intelligence.any.run. 

2. Navigate to TI Reports via the icon on the left. 

3. Click on a report of your choice in the feed

View sample report on APT41 Attacks  

TI Reports main page 

As a fresh report is added, the “New” badge will emerge on the “TI Reports” icon. 

Collect intelligence on active cyber threats
with ANY.RUN’s TI Lookup 



Get free requests to test it


Data Behind TI Reports 

TI Reports are founded on fresh real-world data about new and ongoing threats, handpicked and processed by ANY.RUN analysts. Our Interactive Sandbox, among other sources, provides us with a constantly filling community-powered collection of malware sample analyses.  

Each report lets researchers dive deeper into any indicator or artifact with pre-created TI Lookup search queries to discover more relevant data.  

Info You Can Find in TI Reports 

Each report begins with the actor or vehicle overview and continues with its basic description: aims, origins, first-seens, targeted industries and countries. The description helps to grasp the scale and context of a threat, letting you understand its relevance to specific industries. 

An example of a recent report 

A list of TTPs used by the attackers contains their tactics, techniques and procedures which are methods and tools that adversaries engage and combine in their campaigns. TTPs are followed by a collection of indicators — of compromise (IOCs), of behavior (IOBs) and of attack (IOAs) — associated with the threat or the group.

TTPs and indicators are essential for setting up proactive cyber defense and are listed along with links to sandbox sessions showing them in action.  

An example of a recent report, continued: data on IOCs

Last but not least, YARA and SIGMA rules are included for tuning the detection systems. 

An example of a recent report, continued: YARA rules  

References and links for wider research are integrated into report text, and more are added as an appendix.  


Enrich your threat knowledge with TI Lookup

Learn to Track Emerging Cyber Threats

Check out expert guide to collecting intelligence on emerging threats with TI Lookup



Benefits for SOC Teams 

For security analysts and SOC teams, Threat Intelligence Reports are to fuel the critical measures in building and supporting a robust cyber security infrastructure:  

  • Enhanced Threat Detection: gather IOCs, IOBs, IOAs, and TTPs to tune monitoring and detection for SIEMs and firewalls; compose new rules and fine-tune existing ones.  
  • Incident Response: use reports to understand the scope, impact, and nature of threats for reducing response time. 
  • Proactive Defense: block known threats preemptively and prepare mitigations for similar attacks. 
  • Threat Hunting: watch TTPs to look for similar behaviors that might indicate an attack before it unfolds. 
  • Research and Development: add the Reports’ data to your sources for studying new or evolving malware. 

Benefits for Businesses

For organization stakeholders and decision makers, TI Reports are a valuable resource for fulfilling security-related business goals and objectives:  

  • Risk Assessment: understand the risk landscape better, see how threats might impact business operations, grasp risks specific to your industry or organization. 
  • Strategic Decision Making: allocate security resources based on threat intelligence, align your budget with actual risks.  
  • Strategic Planning: develop cybersecurity strategies and policies to protect business assets. 
  • Compliance and Reporting: use Reports to signal due diligence in cybersecurity practices, your adequacy in threat monitoring and response.  
  • Communication and IR: accommodate Reports to explain the state of cybersecurity to non-technical stakeholders, to illustrate why certain investments or actions are necessary. 
  • Reputation Management: manage the narrative around how the incident was handled in case it happens.  
  • Insurance and Legal: strengthen your position for insurance purposes or in legal scenarios with access to comprehensive threat intelligence: it can be beneficial in proving due diligence or in understanding the extent of a security incident. 

Conclusion 

Threat Intelligence Reports, as unique pieces of research crafted by ANY.RUN’s threat analysts with proactive approach to cyber attacks in mind, can assist both security teams in their everyday routine, and management in their strategic planning.

About ANY.RUN

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.

Request free trial of ANY.RUN’s services → 

The post Threat Intelligence Reports: Get Fresh Research on the Latest Cyber Attacks and APTs appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Cyble Warns of Exposed Medical Imaging, Asset Management Systems

Cyble Warns of Exposed Medical Imaging, Asset Management Systems

Overview

Cyble’s weekly industrial control system (ICS) vulnerability report to clients warned about internet-facing medical imaging and critical infrastructure asset management systems that could be vulnerable to cyberattacks.

The report examined six ICS, operational technology (OT), and Supervisory Control and Data Acquisition (SCADA) vulnerabilities in total, but it focused on two in particular after Cyble detected web-exposed instances of the systems.

Orthanc, Trimble Cityworks Vulnerabilities Highlighted by CISA

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued advisories alerting users to vulnerabilities in medical imaging and asset management products.

Orthanc is an open-source DICOM server used in healthcare environments for medical imaging storage and retrieval, while Trimble Cityworks is a GIS-centric asset management system used to manage all infrastructure assets for airports, utilities, municipalities, and counties.

In a February 6 ICS medical advisory, CISA said the Orthanc server prior to version 1.5.8 does not enable basic authentication by default when remote access is enabled, which could result in unauthorized access by a malicious actor. The Missing Authentication for Critical Function vulnerability, CVE-2025-0896, has been assigned a CVSS v3.1 base score of 9.8, just below the maximum score of 10.0.

Orthanc recommends that users update to the latest version or enable HTTP authentication by setting the configuration “AuthenticationEnabled”: true in the configuration file.

Cyble provided a publicly accessible search query for its ODIN vulnerability search tool, which users can use to find potentially vulnerable instances.

“This flaw requires urgent attention, as Cyble researchers have identified multiple internet-facing Orthanc instances, increasing the risk of exploitation,” the Cyble report said. “The exposure of vulnerable instances could allow unauthorized access to sensitive medical data, manipulation of imaging records, or even unauthorized control over the server. Given the high stakes in healthcare cybersecurity, immediate patching to version 1.5.8 or later, along with restricting external access, is strongly recommended to mitigate potential threats.”

CVE-2025-0994 is an 8.6-rated Deserialization of Untrusted Data in Trimble Cityworks that was reported to CISA by Trimble, which quickly patched the vulnerability and issued mitigation guidance. CISA issued an advisory on the vulnerability, which affects Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10, and also added the vulnerability to CISA’s Known Exploited Vulnerabilities catalog.

Cyble provided an ODIN search query for users to check for exposed Cityworks instances and a hash query for ODIN subscribers.

Recommendations for Mitigating ICS Vulnerabilities

Cyble recommends several important controls for mitigating ICS vulnerabilities and improving the overall security of ICS systems. The measures include:

  1. Staying on top of security advisories and patch alerts issued by vendors and regulatory bodies like CISA. A risk-based approach to vulnerability management reduces the risk of exploitation.
  2. Implementing a Zero-Trust  Policy to minimize exposure and ensure that all internal and external network traffic is scrutinized and validated.
  3. Developing a comprehensive patch management strategy that covers inventory management, patch assessment, testing, deployment, and verification. Automating these processes can help maintain consistency and improve efficiency.
  4. Proper network segmentation can limit an attacker’s potential damage and prevent lateral movement across networks. This is particularly important for securing critical ICS assets, which should not be exposed to the Internet if possible and properly protected if remote access is essential.
  5. Conducting regular vulnerability assessments and penetration testing to identify gaps in security that might be exploited by threat actors.
  6. Establishing and maintaining an incident response plan and ensuring that it is tested and updated regularly to adapt to the latest threats.
  7. All employees, especially those working with Operational Technology (OT) systems, should be required to undergo ongoing cybersecurity training programs. The training should focus on recognizing phishing attempts, following authentication procedures, and understanding the importance of cybersecurity practices in day-to-day operations.

Conclusion

These vulnerabilities show the danger that medical and critical infrastructure system vulnerabilities can pose to patients, utilities, airports, and other sensitive environments. The organizations and CISA responded rapidly in these cases, but now users must do the same and ensure that the systems are patched and properly protected.

Regardless of the sector, staying on top of ICS vulnerabilities and applying good cybersecurity hygiene and controls can limit risk. This includes limiting internet exposure and properly protecting assets that must be accessed remotely.

To access the full report on ICS vulnerabilities observed by Cyble, along with additional insights and details, click here. By adopting a comprehensive, multi-layered security approach that includes effective vulnerability management, timely patching, and ongoing employee training, organizations can reduce their exposure to cyber threats. With the right tools and intelligence, such as those offered by Cyble, critical infrastructure can be better protected, ensuring its resilience and security in an increasingly complex cyber landscape.

The post Cyble Warns of Exposed Medical Imaging, Asset Management Systems appeared first on Cyble.

Blog – Cyble – ​Read More

CISA Updates Known Exploited Vulnerabilities Catalog with Four Critical Issues

Cyble CISA Updates Known Exploited Vulnerabilities Catalog with Four Critical Issues

In a recent update to its Known Exploited Vulnerabilities Catalog, the Cybersecurity and Infrastructure Security Agency (CISA) has added four security vulnerabilities that are currently under active exploitation. These vulnerabilities span across multiple platforms and pose substantial security risks for both organizations and individual users.

The vulnerabilities identified in CVE-2024-40891, CVE-2024-40890, CVE-2025-21418, and CVE-2025-21391 can be exploited with relative ease if security updates are not applied promptly. Users and organizations should follow the guidance provided by vendors like Zyxel and Microsoft, ensuring that their systems are updated regularly to address the latest security flaws.

For organizations relying on Zyxel DSL routers or Windows-based systems, it is crucial to assess the exposure to these vulnerabilities and take immediate steps to update firmware or software versions.

Details of the Vulnerabilities and Active Exploitation

CVE-2024-40891 and CVE-2024-40890: Critical Command Injection Vulnerabilities in Zyxel DSL Routers

The two vulnerabilities—CVE-2024-40891 and CVE-2024-40890—are related to a series of Command Injection Vulnerabilities affecting Zyxel DSL CPE devices. Specifically, these vulnerabilities affect the Zyxel VMG4325-B10A router model running firmware version 1.00(AAFR.4)C0_20170615.

Both vulnerabilities share a common thread: they allow authenticated attackers to execute arbitrary operating system (OS) commands on the affected devices via Telnet (CVE-2024-40891) or a crafted HTTP POST request (CVE-2024-40890). This puts devices at high risk of being compromised by threat actors who can exploit these weaknesses to gain control of the affected systems.

According to the official Zyxel advisory, both vulnerabilities have been assigned a CVSS severity score of 8.8 (High). These flaws stem from improper neutralization of special elements used in OS commands (CWE-78: Improper Neutralization of Special Elements used in an OS Command). Once successfully exploited, the vulnerabilities could allow attackers to bypass authentication and execute malicious OS commands, effectively compromising the security of the devices.

Zyxel has issued advisories urging users to update their firmware to mitigate these vulnerabilities. Devices using older firmware versions are especially at risk. The active exploitation of these vulnerabilities could lead to severe consequences, such as unauthorized access, data breaches, or complete system takeovers.

CVE-2025-21418: Windows Ancillary Function Driver Buffer Overflow Vulnerability

The third vulnerability in the catalog, CVE-2025-21418, is related to a Heap-based Buffer Overflow in the Windows Ancillary Function Driver for WinSock. This vulnerability affects various Windows operating systems, including Windows 10 (version 1809 and newer) and Windows Server editions, and could allow an attacker to elevate their privileges on the system.

Exploiting this flaw, cybercriminals can gain higher privileges, potentially leading to system compromise. The CVE has been assigned a CVSS score of 7.8, marking it as high severity. The vulnerability arises from improper handling of buffers, specifically during the interaction between the Windows Ancillary Function Driver and WinSock.

Windows users and organizations are encouraged to install security updates to mitigate this threat. If left unpatched, the vulnerability could allow attackers to perform malicious actions that compromise system integrity and confidentiality.

CVE-2025-21391: Windows Storage Link Following Vulnerability

Finally, CVE-2025-21391, a Windows Storage Elevation of Privilege Vulnerability, has been added to the CISA catalog. This vulnerability is tied to an issue in Windows Storage where the system improperly resolves links before accessing files. Known as link following (CWE-59), this vulnerability allows an attacker to perform elevation of privilege attacks, potentially granting them access to files and resources they should not have access to.

This vulnerability affects multiple versions of Windows, including Windows 10, Windows Server 2019, and Windows 11. With a CVSS score of 7.1, this vulnerability is considered moderately severe but still presents cybersecurity risks if left unaddressed. Attackers exploiting this vulnerability can manipulate file access controls to gain higher-level privileges and access critical system components.

Conclusion

The inclusion of CVE-2024-40891, CVE-2024-40890, CVE-2025-21418, and CVE-2025-21391 in CISA’s Known Exploited Vulnerabilities Catalog highlights the ongoing risk of cyberattacks exploiting vulnerabilities in widely used systems. Command injection, buffer overflows, and improper link resolution remain common attack vectors. Organizations must stay vigilant, apply patches promptly, and prioritize security to prevent data breaches and system compromises.

Cyble, with its AI-driven cybersecurity platforms, helps businesses stay protected at all times by providing proactive threat intelligence and real-time vulnerability monitoring. Staying informed and prepared is essential to protecting sensitive data from cyber risks.

References

The post CISA Updates Known Exploited Vulnerabilities Catalog with Four Critical Issues appeared first on Cyble.

Blog – Cyble – ​Read More

BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites

Cyble BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites

Key Takeaways

  • BTMOB RAT is an advanced Android malware evolved from SpySolr that features remote control, credential theft, and data exfiltration.
  • It spreads via phishing sites impersonating streaming services like iNat TV and fake mining platforms.
  • The malware abuses Android’s Accessibility Service to unlock devices, log keystrokes, and automate credential theft through injections.
  • It uses WebSocket-based C&C communication for real-time command execution and data theft.
  • BTMOB RAT supports various malicious actions, including live screen sharing, file management, audio recording, and web injections.
  • The Threat Actor (TA) actively markets the malware on Telegram, offering paid licenses and continuous updates, making it an evolving and persistent threat.

Overview

On January 31, 2025, Cyble Research and Intelligence Labs (CRIL) identified a sample lnat-tv-pro.apk (13341c5171c34d846f6d0859e8c45d8a898eb332da41ab62bcae7519368d2248) being distributed via a phishing site “hxxps://tvipguncelpro[.]com/” impersonating iNat TV – online streaming platform from Turkey posing a serious threat to unsuspecting users.

Figure 1 – Phishing site distributing this malicious APK file
Figure 1 – Phishing site distributing this malicious APK file

On VirusTotal, the sample was flagged by Spysolr malware detection, which is based on Crax RAT, developed by the Threat Actor EVLF. During our analysis, we also checked the official Spysolr Telegram channel, where the TA announced a new project called “BTMOB RAT.”

Figure 2 – BTMOB RAT announcement on the SpySolr Telegram Channel
Figure 2 – BTMOB RAT announcement on the SpySolr Telegram Channel

The malware sample downloaded from the phishing site demonstrated typical RAT behavior, establishing a WebSocket connection with a Command and Control (C&C) server at hxxp://server[.]yaarsa.com/con. The request body revealed the “BTMOB” string along with version number “BT-v2.5”, confirming that the sample is indeed the latest version of BTMOB RAT.

Figure 3 – Request body containing the reference of a BTMOB String
Figure 3 – Request body containing the reference of a BTMOB String

Through their Telegram channel, the TA has been advertising BTMOB RAT, highlighting its capabilities, including live screen control, keylogging, injections, lock feature, and collecting various data from infected devices. The actor is offering a lifetime license for $5,000 (in a one-time payment) with an additional $300 per month for updates and support for the latest version of this malware.

Figure 4 – BTMOB RAT advertisement on the Threat Actor’s Telegram channel
Figure 4 – BTMOB RAT advertisement on the Threat Actor’s Telegram channel

Since late January 2025, we have identified approximately 15 samples of BTMOB RAT (v2.5) in circulation. Earlier variants, active since December 2024, were associated with SpySolr malware, which communicated with hxxps://spysolr[.]com/private/SpySolr_80541.php.

The latest BTMOB RAT version exhibits a similar C&C structure and codebase, indicating that it is an upgraded version of SpySolr malware.

An additional BTMOB RAT sample was shared by MalwareHunterTeam and identified by 0x6rss.

Like many other Android malware variants, the BTMOB RAT leverages the Accessibility service to carry out its malicious actions. The following section provides a detailed overview of these activities.

Technical Details

Upon installation, the malware displays a screen urging the user to enable the Accessibility Service. Once the user turns on the Accessibility Service, the malware proceeds to grant the requested permissions automatically.

Figure 5 – Prompting the victim to grant Accessibility Service access
Figure 5 – Prompting the victim to grant Accessibility Service access

Meanwhile, the malware connects to the C&C server at “hxxp://78[.]135.93.123/yaarsa/private/yarsap_80541.php,” which follows a structure similar to the Spysolr malware. Once connected, it initiates a WebSocket connection for server-client communication and transmits JSON data containing the device ID (pid), BotID (idf), connection type (subc), and a message (msg).

The image below illustrates the “join” connection type request sent to the server, after which the client receives a “Connected” response with the “type” value in JSON.

Figure 6 – WebSocket Connection
Figure 6 – WebSocket Connection

Over the course of our analysis, we observed that the malware receives 5 different responses for value “type” as listed below:

Type Description
proxy Establish other WebSocket connection
stop Stops activity based on server response
join Sends a join message along with device ID and bot ID
com The malware receives various commands through this response type
connected The server sends this response upon successful connection establishment
Unauthorized access The server sends this response when the client fails to register the device

After successfully establishing a WebSocket connection, the malware transmits device-related information, including the device name, OS version, model, battery status, wallpaper, malicious app version number, and the status of malicious activities such as key logs, visited apps, visited links, notifications, and other activities.

Figure 7 – Sending device information to the TA’s server
Figure 7 – Sending device information to the TA’s server

The malware receives commands from the server using the “com” response type. The first command it received was “optns.” Along with this command, the server transmits the activity status to be initiated, which the malware then stores in a shared preference file.

Figure 8 – “optns” command
Figure 8 – “optns” command

Our analysis revealed that the malware receives a total of 16 commands from the server, each of which is listed below, along with its description.

Command Description
optns Get action status to enable malicious activities
fetch Collects the mentioned file in the response or device phone number based on the sub-command
brows Loads URL into WebView, and perform actions based on JavaScript
lock Receives lock pin and other details related to lock, and saves them to the Shared Preference variable
ject Manages injection
file Manages file operations
clip Collects clipboard content
chat Displays a window with the message received from the server, gets the reply entered in the edit field, and sends to the server
wrk Receives additional commands to perform other activities such as collecting SMS, contacts, location, files, managing audio settings, launching activity, and many other
srh Search file
mic Records audio
add Get all collected data, including keylogs, active injections, links, device information, wallpaper, and SIM information
bc Opens alert Window or displays notification with the message received from the server
upload Downloads injection files
screen Handles live screen activity
scread Collects content from the screen

brows Command

The primary function of this command is to load a URL or HTML content into the WebView and execute actions like collecting input, clicking, and scrolling using JavaScript.

When the malware receives a “brows” command, the server sends additional parameters within a JSON object, including “ltype” and “extdata”. The ltype parameter dictates specific actions for the malware, such as loading a URL or HTML code into the WebView, keeping a record of visited websites, along with timestamps and input data, and transmitting the collected data, as illustrated in Figures 9 and 10.

Figure 9 – “ltype” actions
Figure 9 – “ltype” actions

Figure 10 – Loading HTML code or URL into WebView
Figure 10 – Loading HTML code or URL into WebView

Once the malware loads a URL or HTML code into the WebView, it runs JavaScript to collect user-entered data from the webpage. The extracted information, which may include sensitive details like login credentials, along with the date and website link, is then stored in a JSON object.

Once the data is collected, it is saved in a map variable and later transmitted to the C&C server when the malware receives the “lp” value through the “ltype” parameter.

Figure 11 – Using JavaScript to get input details

The malware can receive additional commands through the “extdata” parameter, which includes actions such as scrolling, clicking, entering text, navigating, and loading another URL.

The “text” and “enter” actions are executed using JavaScript, while navigation, scroll, and other movement-based actions are carried out using Motion events.

Figure 12 – Additional actions performed via the “extdata” parameter
Figure 12 – Additional actions performed via the “extdata” parameter

This feature enables the malware to steal login credentials while also providing various options to automate the credential theft process.

screen Command

When the malware initially receives the “optns” command, it checks the live screen activity status to determine whether to proceed. Based on this status, the malware then initiates screen capture using Media Projection.

Figure 13 – Screen capturing using Media Projection
Figure 13 – Screen capturing using Media Projection

To perform live actions, the malware receives the command “screen” along with different actions as listed below:

  • L: With this action, the malware receives a “lock” value, determining whether to lock or unlock the device. It checks the lock type (PIN, password, or pattern) and unlocks the device accordingly.

Figure 14 – lock/unlock function
Figure 14 – lock/unlock function

If the device is locked with a password, the malware retrieves the saved password from the “mob_lck” shared preference variable, which was previously extracted during “LockActivity”. It then enters the password using “ACTION_ARGUMENT_SET_TEXT_CHARSEQUENCE”, as shown in the figure below.

Figure 15 – Unlocks device using the password
Figure 15 – Unlocks device using the password

If the device is locked with a pattern or PIN, the malware retrieves the pattern coordinates or PIN digits and uses the dispatchGesture API to either draw the pattern or simulate taps on the PIN keypad to unlock the device.

Figure 16 – Unlocks device using lock pattern
Figure 16 – Unlocks device using lock pattern

  • Q: Receives the compression quality number to control the quality of screen content

  • kb: Controls keyboard state

  • mov: Moves the cursor on the screen using specified x and y coordinates.

  • nav: Executes navigation actions such as returning to the home screen, switching to recent apps, or going back.

  • vol: Adjusts the device’s audio volume.

  • snap: Captures a screenshot.

  • block: Displays a black screen to conceal live screen activity from the victim.

  • paste: Gets the text from the server and enters it using “ACTION_ARGUMENT_SET_TEXT_CHARSEQUENCE”

  • sklecolor: Receives a color code to change the color of rectangular boundaries using Accessibility Service API

  • skilton: Turns on the service responsible for capturing screen content

ject Command

The malware utilizes the “ject” command to manage injection activities, including removing the injection list, collecting extracted data during injection, and deleting the extracted injection data from the device.

Figure 17 – ject command operation
Figure 17 – ject command operation

The malware maintains an ArrayList “d” to store target application package names, injection paths, and data collected from injection activities. It uses the “upload” command to download an injection ZIP file into the “/protected” directory. The ZIP file is then extracted, and its contents are saved using the “jctid” filename received from the server.

Figure 18 – Downloading injection files
Figure 18 – Downloading injection files

The malware retrieves the package name of the currently running application and checks if it exists in its list. If a match is found, it loads the corresponding injection HTML file from the “/protected” directory and launches “WebInjector.class” to execute the injection.

Figure 19 – Initiating injection activity
Figure 19 – Initiating injection activity

The WebInjector class loads the injected HTML phishing page into a WebView. When the user enters their credentials on this fake page, the malware captures the input and sends it to the C&C server.

Figure 20 – Loading HTML injection page into the Webview
Figure 20 – Loading HTML injection page into the Webview

wrk Command

When the malware receives a “wrk” command, it also gets a parameter called “cmnd”, which includes additional instructions for executing various malicious activities.

Figure 21 – Receiving additional commands via the “wrk” command
Figure 21 – Receiving additional commands via the “wrk” command

This command enables the malware to perform various malicious activities, including:

  • Collecting contacts, SMS, location data, installed apps, thumbnails, and device information.
  • Controlling audio settings.
  • Requesting permissions.
  • Executing shell commands.
  • Managing files (deleting, renaming, creating, encrypting, or decrypting).
  • Terminating services.
  • Taking screenshots.
  • Stealing images.

Conclusion

BTMOB RAT, an evolution of the SpySolr malware, poses a significant threat to Android users by leveraging Accessibility Services to perform a wide range of malicious activities. From stealing login credentials through WebView injections to manipulating screen content, collecting sensitive data, and even unlocking devices remotely, this malware demonstrates a high level of sophistication.

This potent malware uses WebSocket communication with a C&C server to allow real-time command execution, making it a powerful tool for cybercriminals. The malware’s distribution through phishing websites and continuous updates by the threat actor indicate an ongoing effort to enhance its capabilities and evade detection.

Our Recommendations

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below:

  • Download and install software only from official app stores like Google Play Store or the iOS App Store.
  • Use a reputed anti-virus and internet security software package on your connected devices, such as PCs, laptops, and mobile devices.
  • Use strong passwords and enforce multi-factor authentication wherever possible.
  • Enable biometric security features such as fingerprint or facial recognition for unlocking the mobile device where possible.
  • Be wary of opening any links received via SMS or emails delivered to your phone.
  • Ensure that Google Play Protect is enabled on Android devices.
  • Be careful while enabling any permissions.
  • Keep your devices, operating systems, and applications updated.

MITRE ATT&CK® Techniques

Tactics Technique ID Procedure
Initial Access (TA0027) Phishing (T1660) Malware distribution via phishing site
Persistence (TA0028) Event-Triggered Execution: Broadcast Receivers (T1624.001) BTMOB listens for the BOOT_COMPLETED intent to automatically launch after the device restarts.
Defense Evasion (TA0030) Masquerading: Match Legitimate Name or Location (T1655.001) Malware pretending to be a genuine application
Defense Evasion (TA0030) Application Discovery (T1418) Collects installed application package name list to identify target
Defense Evasion (TA0030) Hide Artifacts: Suppress Application Icon (T1628.001) Hides application icon
Defense Evasion (TA0030) Obfuscated Files or Information (T1406) BTMOB has used string obfuscation
Defense Evasion (TA0030) Input Injection (T1516) Malware can mimic user interaction, perform clicks and various gestures, and input data
Credential Access (TA0031) Clipboard Data (T1414) Collects clipboard data
Credential Access (TA0031) Input Capture: Keylogging (T1417.001) BTMOB can collect credentials via keylogging
Discovery (TA0032) File and Directory Discovery (T1420) BTMOB enumerates files and directories on external storage
Discovery (TA0032) Process Discovery (T1424) The malware checks the currently running application in the foreground with the help of the Accessibility Service
Discovery (TA0032) Software Discovery (T1418) Collects installed application list
Discovery (TA0032) System Information Discovery (T1426) Collects device information such as device name, model, manufacturer, and device ID
Discovery (TA0032) System Network Configuration Discovery (T1422) Malware collects IP and SIM information
Collection (TA0035) Audio Capture (T1429) Malware captures audio using the “mic” command
Collection (TA0035) Data from Local System (T1533) Collects files from external storage
Collection (TA0035) Protected User Data: Contact List (T1636.003) BTMOB collects contacts from the infected device
Collection (TA0035) Protected User Data: SMS Messages (T1636.004) Collects SMSs
Collection (TA0035) Screen Capture (T1513) Malware records screen using Media Projection
Command and Control (TA0037) Application Layer Protocol: Web Protocols (T1437.001) BTMOB uses HTTP to communicate with the C&C server
Exfiltration (TA0036) Exfiltration Over C2 Channel (T1646) Sending exfiltrated data over C&C server
Impact (TA0034) Data Encrypted for Impact (T1471) Malware can encrypt files on the device using AES

Indicators of Compromise (IOCs)

Indicators Indicator Type Description
8dbfcf6b67ee6c5821564bf4228099beaf5f40e4a87118cbb1e52d8f01312f40   SHA256   Analyzed BTMOB RAT
d7b115003784ac2a595083795abffe68d834cdf0 SHA1 Analyzed BTMOB RAT
cb801ef4d92394f984f726c9fc4f8315 MD5 Analyzed BTMOB RAT
hxxp://78[.]135.93.123/yaarsa/private/yarsap_80541.php URL C&C server
hxxp://78[.]135.93.123:8080 URL WebSocket  connection URL
hxxps://tvipguncelpro[.]com/ URL Phishing URL
13341c5171c34d846f6d0859e8c45d8a898eb332da41ab62bcae7519368d2248   SHA256   Analyzed BTMOB RAT
23e6d0fd3bbc71c0188acab43d454c39fa56d206 SHA1 Analyzed BTMOB RAT
e54490097af9746e375b87477b1ffd2d MD5 Analyzed BTMOB RAT
hxxp://server[.]yaarsa.com/con URL WebSocket connection URL
b053a3d68abb27e91c2caf5412de7868fe50c7506e1f9314fee4c26285db7f59 b053a3d68abb27e91c2caf5412de7868fe50c7506e1f9314fee4c26285db7f59 bb20f2bfb78fd5a2ff4693939d061368949cd717b8033b6facba82df26b31a1a a4c15afd6cb79b66fce3532907e65ccd13c8140a3cb26cc334138775f7a6aebd 061fdbf0c61a29d31406887a40b4f6a551600f7366a711ecce6063f61965308d 937e77d2a910a1452f951d2de6f614a6219e707c40b6789ccf31cac0d82868cc 9141e25b93d315843399a757cddb63af55bdbdd4094fba4a6b2bbea89bf9ecf9 b724ca474c2bca77573e071524bd5500f0355c8b6b8bb432dcc2d8664ed2d073 6ce41ee43a5d5f773203cfcf810c0208246f0b27505d49b270288751a747f5a3 8548600b4e461580fe32fea6c1e233a5862483ca9a617d79fdea001ebf5556cc 8df615fa33dcd7aa81adc640ac42a6a9a4a2bebbb5308f1d8a35afa169e99229 186cd8d9998d6c4e2d12a1370056ba910a6f8a2176c8b0c9362a868830fcfb07 071d3ad980ea77a9041c580015b2796d3d5d471c2fc1039c8f381501efb3cda0 04241bc4ce9cece5644cd7f8f86ede7def5cb6122b2f3b5760c2c3556da34a7d 2b725322f9a019b0106a084694c18fbb8604cf64c65182153c4d67ff3adf4e48 2b307f11ae418931674156425c47ff1c0645fb0b160290cd358599708ff62668 SHA256 BTMOB RAT

The post BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites appeared first on Cyble.

Blog – Cyble – ​Read More

New Zealand’s National Cyber Security Centre (NCSC) Reports Surge in Cyber Threats and Vulnerabilities

Cyble New Zealand’s National Cyber Security Centre (NCSC) Reports Surge in Cyber Threats and Vulnerabilities

Overview

The 2023/24 Cyber Threat Report from New Zealand’s National Cyber Security Centre (NCSC), led by Lisa Fong, Deputy Director-General for Cyber Security at the Government Communications Security Bureau (GCSB), sheds light on the country’s rapidly changing cyber threat landscape. The report highlights an increase in cyber incidents targeting individuals, businesses, and critical national sectors, underlining the growing complexity of cyber threats.

For the year ending June 2024, the NCSC recorded a whopping total of 7,122 cybersecurity incidents, marking a new milestone since CERT NZ’s integration into the NCSC. Of these incidents, 95% (6,799) were handled through the NCSC’s general triage process. These incidents primarily affected small to medium businesses and individual users and resulted in a reported financial loss of $21.6 million. While these incidents did not require specialized technical interventions, they still had a substantial impact on those affected, particularly in terms of financial losses and reputational damage.

A smaller subset of incidents, 343 in total, was categorized as having national significance. These incidents were more complex and targeted critical infrastructure or large organizations. Among them, 110 were linked to state-sponsored actors, signaling a slight increase in cyber activities from such groups. Financially motivated cybercriminal activities were responsible for 65 of these high-impact incidents, emphasizing the persistent threat from financially driven attacks such as ransomware and data exfiltration.

2023/24 Cyber Threat Report: State-Sponsored Cyber Threats and Ransomware

One of the most concerning findings in the 2023/24 Cyber Threat Report was the rise of state-sponsored cyber activities, particularly those linked to espionage. These threats have been exacerbated by geopolitical tensions, notably the ongoing Russia-Ukraine conflict. The NCSC observed an uptick in cyber incidents linked to Russian state-sponsored actors and pro-Russian hacktivists. It also noted the growing challenge in distinguishing between state-sponsored cyber activities and financially motivated criminal operations, as some cybercriminals operate with tacit state approval or support.

Ransomware continues to be a security concern, targeting both large organizations and smaller entities, including schools. Although there were efforts to disrupt certain types of financially motivated cyber incidents, experts warn that ransomware actors are evolving and diversifying their operations. Ransomware actors increasingly exploit exfiltrated data to extort payments, causing severe financial and reputational damage. Additionally, Distributed Denial-of-Service (DDoS) attacks are being utilized as an extortion tactic when encryption or data leaks are not feasible.

The Growing Threat of Cyber-Enabled Fraud

The report also highlights a rise in cyber-enabled fraud and online scams, particularly those conducted through social media platforms and cryptocurrency channels. Cybercriminals are increasingly compromising business or corporate email accounts to impersonate trusted organizations. This tactic enables them to deceive victims into sharing sensitive personal information. These types of fraud are causing significant financial and reputational harm as unsuspecting victims fall prey to sophisticated social engineering tactics.

Despite the rise in cyber incidents, the NCSC’s proactive measures in 2023/24 helped prevent an estimated $38.8 million in potential harm. Through swift interventions, the agency disrupted over 10.3 million malicious events, a sharp increase compared to previous years. The NCSC’s efforts in raising cybersecurity awareness, issuing vulnerability alerts, and promoting sector-based security collaborations are crucial in strengthening New Zealand’s collective cyber resilience.

The report strongly urges all New Zealanders and organizations to adopt effective cybersecurity practices and stay vigilant in the face of evolving cyber threats. As the country’s reliance on technology continues to grow, so does the need for better security frameworks to reduce the risk of cyberattacks.

The Role of Technology in Expanding Cyber Threats

The growing accessibility of advanced cyber tools has significantly lowered the barrier for malicious actors. Tools once reserved for well-resourced nations are now widely available to both state-sponsored actors and cybercriminals alike. This proliferation of sophisticated cyber capabilities, coupled with the widespread use of compromised credentials and vulnerabilities in public-facing infrastructure, has made it easier for malicious actors to operate at scale. The impact of these activities can be catastrophic, especially for organizations that rely heavily on technology to deliver services.

Emerging technologies like artificial intelligence and the increasing connectivity of systems have made the cyber threat landscape more complex and widespread. Cybercriminals are leveraging these advancements to launch more sophisticated attacks, exploiting vulnerabilities that were previously difficult to target.

Social Engineering and Phishing Attacks

Social engineering remains one of the most successful tactics used by cybercriminals to deceive victims into compromising their personal information. By exploiting human psychology, attackers manipulate individuals into taking actions that compromise their security.

The NCSC has seen an increase in social engineering tactics, particularly phishing scams targeting individuals and organizations alike. While technological defenses like multi-factor authentication (MFA) can mitigate some attacks, phishing remains a powerful and persistent tool for cybercriminals.

In 2023, the NCSC recorded global data breaches, some of which involved New Zealanders’ personal information. These breaches expose individuals to further cyber risks, such as phishing and account compromises, which remain prevalent and often lead to significant financial losses.

Trends in Cybersecurity Incidents

The NCSC categorizes incidents based on severity, with the most significant incidents classified as C3. These high-impact incidents often involve ransomware or data exfiltration activities and affect critical infrastructure or key organizations. The report notes that 2023 saw a decline in ransomware incidents compared to previous years, although the attacks that did occur were still highly disruptive. While ransomware remains a concern, other types of attacks, such as phishing and malware, are equally problematic.

In contrast to C3 incidents, moderate (C4) and routine (C5) incidents saw an increase in frequency. Many of these incidents were linked to vulnerabilities being exploited multiple times.

Conclusion

The 2023/24 Cyber Threat Report from New Zealand’s NCSC highlights the increasingly complex nature of cyber threats despite a decrease in overall incident volume. The most common attack techniques included exploiting vulnerabilities in public-facing applications and reconnaissance activities like vulnerability scanning and credential gathering.

The report also emphasizes the growing risk of adversary-in-the-middle (AITM) phishing attacks, which bypass traditional security measures like MFA, urging organizations to adopt more robust solutions such as phishing-resistant MFA methods. While the NCSC’s proactive efforts have successfully mitigated many threats, the expanding reliance on technology and the growing availability of cyber capabilities necessitate ongoing vigilance and adaptability.

References

The post New Zealand’s National Cyber Security Centre (NCSC) Reports Surge in Cyber Threats and Vulnerabilities appeared first on Cyble.

Blog – Cyble – ​Read More

How scammers trick people on Valentine’s Day | Kaspersky official blog

If you’re still under the illusion that scammers only target illiterate simpletons and would never be interested in you, think again. Fraud is a subtle art, and even the most tech-savvy person could fall for a well-crafted scheme. In 2025, scammers are leveraging artificial intelligence, chatbots, and the global trend toward automation.

With Valentine’s Day coming up, we reveal how scammers exploit the feelings of both those in love and those seeking it.

“This is Brad Pitt. I’m seriously ill and I need someone like you by my side”

At the start of 2025, a wholly unbelievable story shook the internet: a French woman thought she’d been dating Brad Pitt for a year-and-a-half online — only to discover it was a scam. The scammer used the actor’s image to swindle her out of about $850,000. He employed a classic scheme: claiming to be ill, “Brad Pitt” wanted to send his beloved expensive gifts but couldn’t pay the customs fees from his own accounts. So, he asked the woman to cover the costs, which she did. To appear more convincing, the scammer maintained almost daily contact and sent the victim poorly edited photos. The woman even received messages from a fake “Brad Pitt’s mother”, who thanked the woman for supporting her “son” during difficult times.

The fake Pitt showed the victim signed postcards with her name and sent sad photos from his hospital bed

The fake Pitt showed the victim signed postcards with her name and sent sad photos from his hospital bed. Source

If you didn’t immediately question these hospital photos of “Brad Pitt”, check out our guide on spotting AI-generated fakes: Watch the (verified) birdie, or new ways to recognize fakes.

“Your partner is cheating on you”… or are they?

This is pretty much classic sextortion. Sextortion comes in a number of colorful varieties, but most often scammers send a message like this: “Hello! We represent a major security company and have gained access to all the data on your spouse’s personal devices. He/she is cheating on you, and we have evidence. Click the link to see it”. Hopefully, regular readers will have already guessed that there’s no “evidence” behind that link, and the “security company” is just another front. The only real thing here is the malicious link itself, leading you to loss of money and data.

An updated variation of this scam involves a teaser of a deepfake porn video featuring your significant other — and you can “purchase the full video” via the link. In yet another scenario, the scammers threaten to distribute AI-generated porn starring you to all your friends, colleagues, and contacts, unless you pay up immediately. Of course, you should absolutely never pay the criminals in this case — as Eugene Kaspersky explained in detail a few years ago. By the way, you can learn about other popular types of sextortion in our dedicated post, Fifty shades of sextortion.

Unexpected betrayal

Sadly, sometimes the biggest privacy threats come from current or former partners. For example, they might make your intimate photos public without your consent or knowledge. A 2024 study by our experts found that one-third of respondents store nudes on their devices, while one-in-four share intimate photos with their partners without considering the risks.

But even those who never take nudes can land in trouble: “I never took photos of myself naked, but one day, I started getting messages from strangers telling me how hot and sexy I looked. Turns out, my husband of ten years had been secretly photographing me while I slept and uploading the pictures to various forums”. For a video report on this and similar cases, plus tips on protecting yourself from revenge porn and removing leaked nudes from the web, check out our article, The Naked Truth.

“I’m something of a detective myself”

Some overly jealous individuals go as far as spying on their partners. And no, these days, you don’t need to hire a private detective — jealous lovers usually resort to spyware (stalkerware/spouseware) or Bluetooth tracking devices.

Software surveillance. Last year, a story went viral on social media about a woman who received a high-end smartphone as a gift from her boyfriend. Months later, she was shocked to discover that he knew a little too much about her whereabouts, conversations with friends, and private life in general. It turned out that before giving her the phone, her jealous partner had loaded it with all sorts of spyware to track her location and eavesdrop on her conversations.

Commercial surveillance apps are widely available. They’re often disguised as “parental control” apps, but once installed, they typically remain completely invisible on the device. They may also disguise themselves as something innocuous — a messaging app, a game, or a photo-gallery app. These apps are particularly easy to install and conceal on Android devices.

However, installing them usually requires physical access to the device. That’s why the first step to protect yourself is to set a strong screen lock password and never share it with anyone.

Wireless tracking. A tiny Bluetooth tracker can be slipped into a victim’s bag, car, or personal belongings — transmitting their location and movements to the stalker. It’s worth noting that even some of the latest wireless earbuds (TWS headphones) can also be used as tracking devices.

Fortunately, both software and hardware trackers can be detected and neutralized using the Who’s spying on me feature in Kaspersky for Android.

How to protect yourself from scams targeting lovers or the lovelorn

No matter how sophisticated a scam is, you can almost always protect yourself — especially when it comes to romance-related schemes. Here’s a list of tips to make your private life a little safer:

  • Use online dating apps safely. Create a private profile, share minimal confidential information, and be especially careful when interacting with new people.
  • Secure your devices with reliable protection to safeguard yourself from jealous partners or stalking exes.
  • Learn to tell real photos from deepfakes. Always double-check suspicious images.
  • Don’t engage with scammers who demand money or personal data in exchange for not releasing deepfake porn or nudes. It’s a bluff.

Kaspersky official blog – ​Read More

How to Track Advanced Persistent Threats

Advanced persistent threats (APTs) stand out as one of the most formidable challenges for businesses in the cybersecurity landscape. These threats can cause irreparable damage, leading to financial losses, data breaches, and reputational harm. 

APTs are defined as sophisticated targeted attacks typically conducted by highly funded adversaries: national agencies, state-sponsored groups, organized crime groups, corporate espionage actors.  

What Are APTs 

The name speaks for itself, APTs are:   

  • Advanced: Having at hackers’ disposal the full (and ever-growing) arsenal of techniques and tools to get and maintain access to the target.  
  • Persistent: The aim is to keep long-term access to the targeted system or network. This involves constant improving and updating of the tools to evade detection.  
  • Threats: Such campaigns are intentionally malicious and inevitably harmful. They are backed by coordinated actions of skilled, motivated, organized, and well-resourced professionals.  

Why Are APTs a Significant Threat to Businesses 

APTs prefer to target large corporations, government entities, and critical infrastructure. Finance, manufacturing, healthcare, and energy are prime targets for APTs due to the high value of their assets, data and infrastructure. The consequences of a successful APT attack extend beyond financial loss and corporate damage — they can impact national security, cause market instability, disrupt economies, and put lives at risk. 
 
But no business, however modest-scale and unrelated to strategic industries, can consider itself safe:  

  • Small and medium companies still possess valuable assets, handle sensitive customer information, financial data, or intellectual property 
  • They are part of supply chains that can be disrupted by attacks 
  • A successful infiltration into their communications grants access to larger partners or clients. 
  • Along with all this, they have weaker security posture, invest less in cyber threat prevention. 

Detect Early, Defend Better: The Power of Threat Intelligence 

Threat intelligence is a pivotal element of an APT-resistant cybersecurity strategy. By gathering, analyzing, and applying intelligence on cyber threats, organizations can proactively detect and neutralize them before they escalate.  
 
TI provides: 

  • Early Detection: Identifying indicators of compromise (IOCs) before damage occurs. 
  • Behavioral Analysis: Understanding attacker tactics, techniques, and procedures (TTPs) to anticipate movements. 
  • Threat Hunting: Actively searching for hidden threats within the network. 
  • Stronger Security Posture: Defenses based on real-world threat insights. 
  • Incident Response Efficiency: Rapidly responding to and mitigating APT incidents. 

How Threat Intelligence Lookup Facilitates APT Reconnaissance 

TI Lookup helps organizations enrich threat data on the latest cyber attacks

ANY.RUN’s Threat Intelligence Lookup is a solution fit for all these tasks: a state-of-the-art search engine for threat researchers and cybersecurity teams. It provides detailed insights into indicators of compromise (IOCs), malware behavior, and attack patterns.  
 
It supports over 40 search parameters to query a constantly updated database of threat data, collected from millions of public malware and phishing samples and manually analyzed by a team of threat analysts.  
 
For a business, it’s a source of actionable information for preventing, detecting and mitigating all sorts of cyberattacks up to APTs, thus avoiding operational disruptions, financial and reputational damages.  

Collect intelligence on active APTs
with ANY.RUN’s TI Lookup 



Get free requests to test it


How TI Lookup helps track APTs 

Wicked Panda APT: Closer Look at an Abused Registry Key 

A notorious Chinese APT group, APT41 aka Wicked Panda, employs a PowerShell-backdoor for compromising systems.

To maintain persistence, it adds its payload in Windows registry entry HKCUEnvironmentUserInitMprLogonScript which allows it to run malicious code automatically at each user login into the system. Besides, the hackers abuse a legitimate Microsoft’s forfiles.exe utility.  
 
This data is enough to combine a query for TI Lookup:

registryKey:”HKEY_CURRENT_USERENVIRONMENT” AND registryValue:”forfiles.exe” AND threatName:”backdoor” AND registryName:”USERINITMPRLOGONSCRIPT” 

IOC and event search by registry key and value 

From the search results, we can extract additional IOCs associated with such campaigns, like file hashes or mutexes, and use them for setting up threat detection and alerts.

Sandbox session with an APT41 backdoor attack 

The Tasks tab shows recent sandbox sessions with analysis of the attack. The sessions can be viewed in ANY.RUN’s Interactive Sandbox to study TTPs and other components of the attack.

MuddyWater APT: Identifying a Backdoor via Mutexes 

Another example: MuddyWater APT group from Iran is known for using PackageManager and DocumentUpdater mutexes in their malware campaigns. The mutexes are generated by their BugSleep backdoor.  
 
The attack starts through a phishing email, BugSleep gets deployed, creates a mutex and decrypts its configuration, including the addresses of command-and-control servers. This behavior has been observed in MuddyWater campaigns targeting organizations in Israel and other countries. 
 
We can accommodate both mutexes into a TI Lookup search request:  
 
(syncObjectName:”PackageManager” or syncObjectName:”DocumentUpdater”) and syncObjectOperation:”Create” and threatName:”muddywater” 

Mutex name search results in TI Lookup Synchronization tab 

Diving deeper in the search results, we can identify the actual samples that use this mutex.

Bugsleep backdoor and its behavior demonstrated by the ANY.RUN Sandbox  

We can navigate to the sandbox sessions where these mutexes were used to explore the threat and its behavior in greater detail.


Enrich your threat knowledge with TI Lookup

Learn to Track Emerging Cyber Threats

Check out expert guide to collecting intelligence on emerging threats with TI Lookup



Lazarus Group: Following North Korea’s Biggest APT

Lazarus is one of the most active threats coming from North Korea. The group has been involved in many cyber attacks on both businesses and individuals. One of the recent examples involved conducting fake interviews with tech professionals to install malicious programs on their devices.

With TI Lookup, we can not only explore the most recent samples and collect indicators related to Lazarus but also subscribe to receive updates on specific queries.

TI Lookup lets users subscribe to specific queries and receive updates on new results

Let’s use the simple query like threatName:”lazarus” and click the bell icon to subscribe to updates.

TI Lookup lists all of your subscriptions along with info on new results

As soon as new indicators or sandbox sessions relevant to the query appear in TI Lookup’s database, we will be notified about them.

Learn more about notifications in TI Lookup

Conclusion 

APTs represent a high level of cyber threat due to their strategic nature, the resources behind them, and their capability to adapt and evolve over time. Organizations, especially those in critical sectors or handling sensitive information, need robust cybersecurity strategies to defend against such threats. Threat intelligence is a cornerstone of such a strategy, and TI Lookup from ANY.RUN has proven itself as a comprehensive tool for fueling intelligence with fresh contextual data. 

About ANY.RUN

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.

Request free trial of ANY.RUN’s services → 

The post How to Track Advanced Persistent Threats appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More