Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

ShowDoc Vulnerability Patched in 2020 Now Used in Active Server Takeovers

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Hackers are currently exploiting a vulnerability in ShowDoc, identified as CVE-2025-0520, which was discovered five years ago. This flaw allows attackers to deploy web shells, enabling remote code execution (RCE) and complete server takeovers on affected systems. The exploitation of this vulnerability is happening globally, impacting various organizations that use ShowDoc. It’s crucial for users and companies to address this issue promptly to prevent unauthorized access and potential data breaches. Security teams should prioritize patching their systems to mitigate the risk posed by this vulnerability.

Impact: ShowDoc (version not specified), potentially all installations of ShowDoc that have not been updated since the vulnerability was disclosed.
Remediation: Users should apply any available patches for ShowDoc immediately. If patches are not available, disabling the affected services or restricting access to them can help mitigate risks. Additionally, organizations should review their server configurations and implement monitoring for any unauthorized changes.
Read Original
Operation PowerOFF: 75K Users of DDoS-for-Hire Services Identified and Warned

Hackread – Cybersecurity News, Data Breaches, AI and More

Operation PowerOFF has successfully identified and issued warnings to around 75,000 users of DDoS-for-hire services. This initiative, led by Europol, resulted in four arrests and the seizure of 53 domains associated with these illegal services. DDoS-for-hire, also known as 'booting', involves paying individuals or groups to launch distributed denial-of-service attacks against targeted websites or networks, causing disruption. The crackdown not only targets the providers but also the users who engage in these activities, highlighting the ongoing efforts to combat cybercrime. Users involved in these services face potential legal consequences, which raises awareness about the risks of participating in such illicit activities.

Impact: DDoS-for-hire services
Remediation: Users are advised to cease engagement with DDoS-for-hire services and to seek legal counsel if they are involved.
Read Original

Grinex, a cryptocurrency exchange based in Kyrgyzstan and already sanctioned by the U.K. and U.S., has announced the suspension of its operations following a cyber attack that resulted in the theft of $13.74 million. The exchange claims this attack was orchestrated by foreign intelligence agencies, suggesting a coordinated effort rather than a random act of cybercrime. This incident raises concerns not only for Grinex but also for the broader cryptocurrency market, as it highlights vulnerabilities within exchanges, especially those already under scrutiny. The attack's implications could deter users from engaging with platforms that have been targeted, thereby affecting market confidence. As the investigation unfolds, the exchange and its users are left grappling with the fallout from this significant breach.

Impact: Grinex cryptocurrency exchange
Remediation: N/A
Read Original

Researchers from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42 have identified that attackers are exploiting a command injection vulnerability, CVE-2024-3721, in TBK DVRs and outdated TP-Link Wi-Fi routers. This medium-severity flaw, which has a CVSS score of 6.3, allows malicious actors to hijack these devices to create a botnet for DDoS attacks. The compromised TBK DVRs and EoL TP-Link routers are particularly concerning as they can be easily targeted due to their lack of ongoing support and security updates. This situation poses a significant risk to users, as their devices can be turned into tools for larger-scale cyberattacks without their knowledge. Users of these devices should take immediate action to secure their systems against potential exploitation.

Impact: TBK DVRs and end-of-life TP-Link Wi-Fi routers
Remediation: Users should update their devices to the latest firmware if available, or replace unsupported devices. Additionally, changing default credentials and disabling remote access can help mitigate risks.
Read Original

Kejia Wang and Zhenxing Wang, two residents of New Jersey, have been sentenced to nine years and nearly eight years in prison, respectively, for their roles in facilitating a North Korean laptop farm. This operation was part of a scheme that falsely represented IT workers, generating over $5 million for the North Korean regime. The laptop farm was used to support various illicit activities, highlighting the ongoing challenges posed by cyber operations linked to North Korea. The U.S. Department of Justice's actions aim to disrupt these types of operations and send a clear message against aiding sanctioned regimes. This incident serves as a reminder of the global reach of cybercrime and the importance of international cooperation in combating it.

Impact: N/A
Remediation: N/A
Read Original

A security researcher known as Chaotic Eclipse has released a proof-of-concept (PoC) exploit for a zero-day vulnerability in Microsoft Defender, identified as 'RedSun'. This follows the earlier disclosure of an exploit for another flaw in Defender, tracked as CVE-2026-33825, known as the BlueHammer flaw. The implications of these exploits are significant, as they expose users of Microsoft Defender to potential attacks that could compromise system security. Organizations using this antivirus solution should be particularly vigilant, as the release of these exploits could lead to increased attempts at exploitation by malicious actors. It's crucial for users to stay informed about updates from Microsoft regarding these vulnerabilities.

Impact: Microsoft Defender, CVE-2026-33825 (BlueHammer), CVE-2026-33826 (RedSun)
Remediation: Users should ensure that Microsoft Defender is updated to the latest version and monitor for any security patches or updates issued by Microsoft regarding these vulnerabilities. Implementing strict security protocols and user training on recognizing phishing attempts can also mitigate risks.
Read Original
Actively Exploited

According to Infosecurity Magazine, ransomware attacks on automotive manufacturers have surged dramatically, with incidents more than doubling from 2024 to 2025. This alarming trend signals a growing vulnerability within the automotive sector, which has increasingly integrated digital technologies into its operations. As attackers target these manufacturers, the potential for significant disruptions in production and supply chains rises, posing risks not only to the companies involved but also to consumers and the broader economy. The rise in ransomware incidents indicates a pressing need for the automotive industry to enhance its cybersecurity measures and prepare for potential attacks. Companies must prioritize protecting their systems to safeguard against these evolving threats.

Impact: Automotive manufacturers
Remediation: Companies should enhance cybersecurity measures, implement regular security audits, and train employees on recognizing phishing attempts.
Read Original

The PowMix botnet has been quietly targeting the workforce in the Czech Republic since December, using randomized communication techniques to evade detection. This stealthy operation involves the botnet compromising systems to potentially gain unauthorized access to sensitive information or resources. Researchers at The Hacker News have reported on the campaign, emphasizing the risk it poses to businesses and organizations in the region. As the botnet continues its activities, it raises concerns about the security of the Czech workforce and the need for enhanced protective measures against such covert attacks. Organizations are urged to remain vigilant and adopt robust security practices to defend against this emerging threat.

Impact: Czech Republic workforce systems, potentially affecting various sectors
Remediation: Organizations should implement enhanced monitoring and security measures to detect unusual network activity, update security protocols, and educate employees about potential phishing and malware threats.
Read Original

A newly released underground guide reveals insights into how cybercriminals assess and engage in the stolen credit card market. Rather than simply using stolen credit cards, the guide emphasizes a systematic approach where fraudsters carefully vet their suppliers. This shift indicates a more organized and methodical operation within the realm of credit card fraud. The implications are significant, as it suggests that attackers are becoming more sophisticated, which could lead to an increase in successful fraud attempts. As a result, consumers and financial institutions may face heightened risks as these organized networks operate more effectively.

Impact: Stolen credit card markets
Remediation: N/A
Read Original

In November 2022, a group of hackers executed a credential stuffing attack against DraftKings, using stolen usernames and passwords sourced from the dark web. This method allowed them to gain unauthorized access to numerous user accounts, compromising sensitive information for many customers. The incident culminated in a legal case where one of the attackers was sentenced to 30 months in prison. This case serves as a reminder of the dangers of reusing passwords across different platforms, as it can make users vulnerable to such attacks. Companies like DraftKings must ensure robust security measures are in place to protect user data from similar threats in the future.

Impact: DraftKings user accounts
Remediation: Users should enable two-factor authentication and avoid reusing passwords across different services.
Read Original
Actively Exploited

A new malware strain called ZionSiphon has been identified targeting water systems in Israel. According to a report by Darktrace, ZionSiphon uses several common cyberattack techniques, including privilege escalation and persistence mechanisms, allowing it to remain on infected systems. It can also propagate through removable media, which raises concerns about its ability to spread across different devices. This development is particularly alarming given the critical nature of water systems and the potential for significant disruption. Security experts are urging organizations, especially those in critical infrastructure, to remain vigilant and enhance their cybersecurity measures to defend against this type of threat.

Impact: Israeli water systems
Remediation: Organizations should enhance their cybersecurity measures, focusing on monitoring for unusual activity and securing removable media.
Read Original

Operation PowerOFF has successfully disrupted several 'booter' services that allow users to pay for launching distributed denial-of-service (DDoS) attacks. These services have been a growing concern as they enable individuals to easily target websites and online services, causing disruptions and potential financial losses. Law enforcement agencies coordinated efforts to take down these operations, leading to multiple arrests. This crackdown is significant as it aims to reduce the accessibility of DDoS attack tools, which can affect various online services and users. The operation highlights the ongoing battle against cybercrime and the need for continued vigilance in cybersecurity.

Impact: DDoS-for-hire services, online gaming platforms, websites of various businesses
Remediation: N/A
Read Original

A Dutch Navy warship was tracked using a Bluetooth device that was mailed to a deployed service member. Journalist Just Vervaart obtained publicly available instructions from the Dutch Ministry of Defence regarding how to send mail to those in the field. The incident raises serious concerns about the security of military assets, as the Bluetooth device allowed for real-time tracking of the vessel's location. This situation highlights vulnerabilities in military communications and logistics, which could be exploited by adversaries. The implications of such tracking could endanger the safety of personnel and compromise operational security.

Impact: Dutch Navy warship, Bluetooth device
Remediation: Military personnel should avoid using unverified devices for communication and tracking, and the military may need to review and enhance security protocols surrounding mail sent to deployed service members.
Read Original

Grinex, a cryptocurrency exchange based in Kyrgyzstan, has suspended its operations after a significant cyber attack resulted in the theft of $13.7 million. The company claims that the attackers are linked to Western intelligence agencies, and the stolen funds primarily belonged to Russian users of the platform. This incident raises serious concerns about the security of cryptocurrency exchanges and the potential for state-sponsored cyber activities targeting financial platforms. With the growing popularity of cryptocurrencies, such breaches could erode user trust and prompt regulatory scrutiny. The fallout from this attack may have ripple effects across the crypto market, especially for exchanges operating in regions with geopolitical tensions.

Impact: Grinex cryptocurrency exchange, Russian user wallets
Remediation: N/A
Read Original

The Payouts King ransomware has been discovered using the QEMU emulator to create hidden virtual machines on compromised systems, allowing it to bypass standard endpoint security measures. This technique enables attackers to maintain control over infected devices without detection. The malicious software sets up a reverse SSH backdoor, which can facilitate further exploitation or data theft. Organizations using vulnerable systems may find themselves at risk of data breaches or operational disruptions as this ransomware evolves. This incident emphasizes the need for enhanced security measures that can detect and mitigate such sophisticated attacks.

Impact: QEMU, Endpoint security systems, Compromised systems
Remediation: Implement advanced endpoint detection and response solutions, regularly update security software, and monitor for unusual network activity.
Read Original
Page 1 of 160Next