Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Fake CAPTCHA Scam Abuses Verification Clicks to Send Costly International Texts

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent study by Infoblox has uncovered a widespread scam that exploits fake CAPTCHA prompts and manipulates users into sending expensive international text messages. This Click2SMS fraud scheme tricks victims into believing they are completing a verification process, only to find themselves unknowingly agreeing to send costly texts to foreign numbers. The scam primarily targets unsuspecting individuals who may not be aware of the potential charges associated with these messages. As a result, this scheme poses a financial risk to users who fall victim to it. Awareness and caution are essential for individuals navigating online services that require CAPTCHA verification.

Impact: Users tricked into sending international text messages
Remediation: Users should be cautious of unsolicited CAPTCHA requests and verify the legitimacy of the service before proceeding.
Read Original

Researchers at SentinelOne have discovered a previously unknown malware framework called 'fast16,' which dates back to 2005. This Lua-based malware was designed to target high-precision calculation software, which is often used in engineering and industrial applications. The malware predates the infamous Stuxnet worm, which was aimed at disrupting Iran's nuclear program. The implications of fast16 are significant as it shows that cyber sabotage efforts have been in play for much longer than previously thought, raising concerns about the security of critical infrastructure and industrial systems. Companies using this type of software need to be aware of the potential risks and take steps to protect their systems.

Impact: High-precision calculation software used in engineering and industrial applications.
Remediation: Companies should assess their systems for vulnerabilities related to high-precision calculation software and implement security measures to mitigate potential risks.
Read Original

Recent attacks involving malicious browser extensions called 'AiFrame' are targeting users by injecting iframes that display phishing content. These extensions are designed to extract sensitive information from users, posing a significant risk to their online security. The attacks can compromise personal data, making it essential for users to be cautious about the extensions they install. This situation highlights the vulnerability of browser ecosystems, where seemingly benign add-ons can turn out to be harmful. Users are advised to only download extensions from trusted sources and to regularly review the permissions granted to their installed extensions.

Impact: Browser extensions, specifically 'AiFrame' extensions
Remediation: Users should avoid installing extensions from unverified sources, regularly check and remove suspicious extensions, and maintain updated antivirus software.
Read Original

A vulnerability known as 'Pack2TheRoot,' tracked as CVE-2026-41651, has been identified in Linux systems, allowing local users to gain root privileges without authorization. This flaw has existed for nearly 12 years and has been rated with a high severity score of 8.8. It enables unprivileged users to install or remove system packages, which could lead to complete control over the system. This issue affects any Linux distribution that utilizes PackageKit, making it a significant concern for users and administrators alike. Given the potential for exploitation, it is crucial for affected parties to take immediate action to secure their systems.

Impact: Linux systems using PackageKit
Remediation: Users should update their systems and apply any available patches for PackageKit. It is also advisable to restrict access to system package management tools and review user permissions to mitigate the risk of unauthorized access.
Read Original

A new hacking group known as BlackFile has emerged, targeting retail and hospitality organizations since February 2026. This group is primarily focused on data theft and extortion, escalating the risk for businesses in these sectors. Researchers found that BlackFile's tactics include vishing attacks, where attackers use phone calls to manipulate victims into revealing sensitive information. The implications of this surge are significant, as it not only threatens the financial stability of affected companies but also jeopardizes customer data and trust. As organizations in retail and hospitality deal with these threats, they need to enhance their security measures and employee training to mitigate the risks associated with such attacks.

Impact: Retail and hospitality organizations
Remediation: Organizations should enhance security measures and employee training to combat vishing attacks.
Read Original

A newly discovered vulnerability known as Pack2TheRoot poses a significant risk to Linux systems by allowing local users to gain root access through the PackageKit daemon. This flaw enables unauthorized users to install or remove system packages, potentially compromising the integrity of the system. The vulnerability could be exploited by anyone with local access to a vulnerable Linux machine, making it a concern for both individual users and organizations that rely on Linux environments. As the flaw can lead to full control over the system, it is crucial for affected users to take immediate action to mitigate risks and secure their systems. Researchers are urging users to monitor their systems closely until a patch is available.

Impact: Linux systems using PackageKit daemon
Remediation: Users should apply updates or patches as soon as they are released, limit local access to systems, and monitor for any unusual activities.
Read Original

U.S. authorities have charged 29 individuals, including a Cambodian senator, for their involvement in a financial fraud scheme targeting American citizens. The operation was centered around a network of fake investment websites, leading to the seizure of over 500 web domains associated with these scams. This crackdown highlights the growing issue of international fraud affecting U.S. residents, particularly as scammers increasingly utilize online platforms to deceive victims. The involvement of a foreign official raises concerns about the extent of these operations and their potential links to organized crime. Law enforcement's swift action is intended to protect citizens from further financial loss and deter similar schemes in the future.

Impact: Fake investment websites targeting U.S. citizens
Remediation: Users should avoid engaging with unsolicited investment opportunities and report suspicious websites to authorities.
Read Original

The U.S. Treasury Department has imposed sanctions on Cambodian Senator Kok An and 28 other individuals and organizations due to their alleged roles in facilitating scam operations. The sanctions aim to disrupt these activities, which often involve fraud and deception targeting individuals and businesses. This action is part of a broader effort to combat international scams and protect potential victims from financial loss. The implications of these sanctions extend beyond Cambodia, as they signal a commitment from the U.S. to tackle global cybercrime and hold accountable those who enable such operations. By targeting key figures in these scams, authorities hope to deter similar activities in the future.

Impact: Individuals and entities involved in scam operations
Remediation: N/A
Read Original

The Russian dark web forum and ransomware network known as RAMP has experienced a significant data breach, revealing a trove of user records and activity logs. This leak exposed thousands of details about how the cybercrime community operates, potentially impacting many individuals and organizations involved in or targeted by ransomware activities. Security researchers have noted that the information could help law enforcement and cybersecurity experts better understand the tactics and networks used by cybercriminals. The breach raises concerns about the security of personal data and the ongoing threats posed by ransomware gangs. As these forums often serve as hubs for cybercriminal collaboration, this incident could have far-reaching implications for future ransomware attacks.

Impact: RAMP forum user records, ransomware networks
Remediation: N/A
Read Original

Bitwarden CLI has been compromised as a result of a supply chain attack linked to TeamPCP, according to researchers from Socket and JFrog. This incident stems from a breach involving Checkmarx, a company that provides security solutions. The implications are significant, as users of Bitwarden CLI may have been exposed to malicious code or vulnerabilities that could compromise their sensitive data. The attack underscores the risks associated with supply chain vulnerabilities, where attackers exploit third-party software to gain access to broader systems. Organizations using Bitwarden should take this seriously and consider evaluating their security measures to prevent potential exploitation.

Impact: Bitwarden CLI, Checkmarx
Remediation: Organizations using Bitwarden CLI should review their security policies and consider updating or patching the affected software as soon as more information becomes available.
Read Original

The U.S. Scam Center Strike Force has conducted a significant operation, seizing over $700 million in cryptocurrency and shutting down more than 500 fraudulent investment websites linked to large-scale scams in Southeast Asia. These scams included romance fraud and 'pig butchering' schemes, where victims are manipulated into investing large sums of money. The operation aimed to dismantle these scam centers that have been exploiting individuals, often targeting vulnerable populations. By taking these steps, authorities hope to disrupt the financial networks that support such criminal activities and provide a deterrent to future scams. This action underscores the ongoing battle against cybercrime, particularly in regions where these scams have proliferated.

Impact: Cryptocurrency, fraudulent investment websites
Remediation: N/A
Read Original
Actively Exploited

The U.S., UK, and eight other allied nations have issued a warning regarding sophisticated cyber operations linked to Chinese state-sponsored groups. These operations involve the exploitation of hacked routers and Internet of Things (IoT) devices worldwide, forming extensive botnets. These botnets are being utilized for various malicious activities, including data theft and disruptive cyberattacks. The implications of this are significant, as they threaten critical infrastructure and sensitive data on a global scale. Organizations and individuals using vulnerable devices need to be particularly vigilant and take steps to secure their networks against these threats.

Impact: Hacked routers, Internet of Things devices
Remediation: Ensure all routers and IoT devices are updated to the latest firmware, change default passwords, and implement network security best practices.
Read Original

A malware known as 'Fast16' has been linked to ongoing cyber tensions between the US and Iran. This malware specifically targets high-precision calculation software, with the intent to manipulate results. Notably, it includes a self-propagation mechanism, which allows it to spread without user intervention. This discovery raises concerns about the potential for state-sponsored cyberattacks and the implications for critical infrastructure, particularly in sectors reliant on precision calculations. As the geopolitical landscape continues to evolve, understanding threats like Fast16 becomes crucial for organizations to safeguard their operations against cyber sabotage.

Impact: High-precision calculation software
Remediation: N/A
Read Original

The Digital Operational Resilience Act (DORA) mandates that financial entities in the EU implement strict authentication and access control measures. This legal requirement aims to enhance security and protect sensitive data against unauthorized access. A breach due to inadequate controls can lead to severe financial repercussions and undermine customer trust. For instance, without proper credential management, attackers could exploit weak points to gain access to financial systems, potentially resulting in data theft or fraud. As financial institutions prepare for compliance, they must prioritize robust authentication strategies to mitigate risks and ensure operational resilience.

Impact: EU financial entities
Remediation: Implement rigorous authentication and access control measures as mandated by DORA.
Read Original

Germany's Bundestag President Julia Klöckner was recently targeted in a phishing attack using the Signal messaging app. The attackers created a fake chat group that appeared to be associated with her political party, the CDU, in an attempt to deceive her. This incident highlights the vulnerabilities of even secure messaging platforms, showing that attackers can exploit them to gain access to personal or sensitive information. As political figures become more reliant on digital communication, the risk of such phishing attempts increases. It serves as a reminder for all users to remain vigilant about the authenticity of the contacts they interact with online.

Impact: Signal messaging app, CDU group chat
Remediation: Users should verify the authenticity of group chats and contacts before engaging, and enable security features such as two-factor authentication where available.
Read Original
Page 1 of 170Next