Articles tagged "Exploit"

Found 96 articles

Resecurity Says ShinyHunters Fell for Honeypot After Breach Claim

Hackread – Cybersecurity News, Data Breaches, AI, and More

Resecurity has responded to claims from the hacking group ShinyHunters, asserting that the attackers did not breach any real systems or access customer data. Instead, Resecurity says the hackers interacted with a honeypot designed to capture malicious activity, which contained only fake information. This incident underscores the ongoing challenges in cybersecurity, as groups like ShinyHunters may attempt to exploit vulnerabilities or claim breaches that aren't genuine. For companies, this serves as a reminder to monitor their security measures and ensure they are prepared for potential threats, even if they turn out to be misdirected. The situation illustrates the importance of having robust security practices in place to counteract both real and perceived threats.

Impact: N/A
Remediation: N/A
Read Original
RondoDox Botnet is Using React2Shell to Hijack Thousands of Unpatched Devices

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Hackers using the RondoDox botnet are exploiting a vulnerability in Next.js known as React2Shell to take control of over 90,000 unpatched devices. This includes a range of products such as routers, smart cameras, and small business websites. The attack is particularly concerning because it targets devices that often lack regular updates or security patches, making them easy targets for cybercriminals. Users of these devices should be vigilant and consider updating their systems to protect against this growing threat. The scale of the devices affected raises alarms about the potential for widespread disruption if left unaddressed.

Impact: Routers, smart cameras, small business websites
Remediation: Users should update their Next.js applications to the latest version and ensure that all devices are patched against known vulnerabilities.
Read Original

Over 10,000 Fortinet firewalls are currently at risk due to a two-factor authentication (2FA) bypass vulnerability that has been known for five years. This vulnerability allows attackers to exploit systems that have not implemented proper security measures, potentially granting them unauthorized access to sensitive data and networks. The issue is particularly pressing because it affects devices that are publicly accessible on the internet, increasing the likelihood of exploitation. Organizations using these firewalls need to act quickly to secure their systems and protect against potential breaches. It's crucial for users to verify their configurations and apply any available updates to mitigate this serious risk.

Impact: Fortinet firewalls, specifically those exposed to the internet and not patched against the 2FA bypass vulnerability.
Remediation: Organizations should immediately review their firewall configurations and apply any available security patches. Users are advised to disable the vulnerable 2FA feature if possible and ensure that their systems are not exposed to the internet without additional security measures. Regularly updating firmware and monitoring for unauthorized access attempts are also recommended.
Read Original

The European Space Agency (ESA) has confirmed a data breach after a hacker, known as '888', attempted to sell stolen data online. The breach involved external science servers, raising concerns about the security of sensitive information related to ESA's projects. This incident highlights the risks that organizations face from cybercriminals looking to exploit vulnerabilities for financial gain. The ESA's acknowledgment of the breach indicates that they are taking steps to address the situation, but the full scope of the data compromised remains unclear. As this breach could potentially affect ongoing scientific research and collaborations, it underscores the need for robust cybersecurity measures in institutions handling critical data.

Impact: European Space Agency external science servers
Remediation: N/A
Read Original

The European Space Agency (ESA) has reported a breach involving external servers that contained unclassified information related to collaborative engineering efforts. While the data accessed was not classified, the incident raises concerns about the security of sensitive information even when labeled as unclassified. The breach emphasizes the importance of securing all types of data, as attackers can exploit vulnerabilities in external systems. ESA has not specified the exact nature of the attack or the extent of the data accessed, but it is a reminder for organizations to review their cybersecurity measures, especially regarding external servers. This incident could potentially affect partnerships and collaborative projects within the space sector, highlighting the need for robust security protocols.

Impact: External servers of the European Space Agency containing unclassified engineering information
Remediation: N/A
Read Original

Fortinet has issued a warning about ongoing attacks that exploit an old vulnerability in its FortiOS software, identified as CVE-2020-12812. This flaw allows attackers to bypass two-factor authentication, which can significantly compromise the security of affected systems. Organizations using FortiOS should be particularly vigilant, as this vulnerability has resurfaced in active attacks. The potential for unauthorized access puts sensitive data at risk, making it critical for users to address this issue promptly. Cybersecurity teams are urged to review their systems and implement necessary updates to safeguard against these threats.

Impact: FortiOS versions that are vulnerable to CVE-2020-12812, particularly those configured with two-factor authentication.
Remediation: Users should apply the latest patches for FortiOS as provided by Fortinet. It is also recommended to review and strengthen two-factor authentication configurations and monitor system access logs for any suspicious activities.
Read Original
Critical 0day flaw Exposes 70k XSpeeder Devices as Vendor Ignores Alert

Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers have identified a critical unpatched vulnerability, designated CVE-2025-54322, in XSpeeder networking devices, which are widely used in industrial and branch environments. Approximately 70,000 devices are affected, leaving them open to potential exploitation. The flaw was discovered by AI agents, but the vendor has not addressed the alert, raising concerns about the security of these devices. This situation poses a significant risk, as attackers could exploit the vulnerability to gain unauthorized access or disrupt operations. Companies using XSpeeder devices should take immediate action to assess their security posture and implement necessary safeguards to protect their networks.

Impact: XSpeeder networking devices, approximately 70,000 units in industrial and branch settings.
Remediation: Companies should evaluate their XSpeeder devices for potential exposure and consider implementing network segmentation and monitoring to mitigate risks. Regularly updating security protocols and reviewing access controls can also help protect against exploitation until a patch is made available.
Read Original

A serious vulnerability has been found in LangChain Core, a key Python package used for developing applications that utilize large language models (LLMs). This flaw, identified as CVE-2025-68664 and assigned a CVSS score of 9.3, could enable attackers to perform prompt injection attacks, which may lead to the theft of sensitive data and manipulation of LLM responses. Organizations using LangChain Core for their applications are at risk, as this vulnerability allows malicious actors to exploit the package to access confidential information. It's critical for developers and companies utilizing this software to take immediate action to secure their systems and protect user data from potential breaches.

Impact: LangChain Core (langchain-core), Python applications built on LangChain ecosystem
Remediation: Update LangChain Core to the latest version that addresses this vulnerability. Review and harden input handling to prevent prompt injection attacks.
Read Original

Users of the Trust Wallet Chrome extension have reported significant cryptocurrency losses after a malicious update was released on December 24. This compromised update allowed attackers to drain wallets, leading to millions in losses for affected individuals. In conjunction with this incident, researchers discovered a phishing domain set up by the hackers, further indicating a coordinated effort to exploit Trust Wallet users. The company has responded urgently, advising users to take precautions and remain vigilant to avoid further losses. This incident serves as a stark reminder of the risks associated with browser extensions and the importance of ensuring that software updates are legitimate and secure.

Impact: Trust Wallet Chrome extension
Remediation: Users are advised to uninstall the compromised extension and monitor their wallets for unauthorized transactions.
Read Original

As cyberattacks targeting the healthcare sector increase, industry organizations are expressing concerns over proposed changes to the HIPAA security rules. Many in the healthcare field believe that the revisions do not adequately address the growing threats and vulnerabilities. The healthcare industry is under significant strain as attackers exploit weaknesses, which could compromise patient data and disrupt services. Stakeholders are advocating for more comprehensive measures to enhance security and better protect sensitive health information. This ongoing debate highlights the urgent need for updated regulations that reflect the current cybersecurity landscape.

Impact: Healthcare systems and patient data
Remediation: Industry stakeholders are calling for stronger security measures, but specific remediation steps are not detailed.
Read Original

Federal authorities have seized a password database linked to a large-scale bank account takeover scheme that targeted $28 million in funds. The attackers used phishing techniques to compromise bank accounts, putting numerous individuals and financial institutions at risk. This operation illustrates the ongoing threat posed by cybercriminals who exploit user credentials to access sensitive financial information. The seizure of the password database is a significant step in disrupting these criminal activities and protecting potential victims from further financial loss. As phishing remains a prevalent tactic, users must remain vigilant and practice safe online behaviors to safeguard their accounts.

Impact: Compromised bank accounts, phishing victims
Remediation: Users should enable two-factor authentication, regularly update passwords, and be cautious of unsolicited communications requesting personal information.
Read Original

WatchGuard has reported an exploitation of a zero-day vulnerability in its Firebox devices, which are critical components for network security. This vulnerability has caught the attention of attackers, joining a troubling trend where various edge device vendors are targeted. Organizations using WatchGuard Firebox devices should be particularly vigilant, as the flaw could allow unauthorized access to their networks. The situation emphasizes the need for prompt attention to security updates and patches to protect against potential breaches. Users and IT departments are advised to stay updated on any security advisories from WatchGuard to mitigate risks effectively.

Impact: WatchGuard Firebox devices
Remediation: Update to the latest firmware version as recommended by WatchGuard.
Read Original

Attackers have begun exploiting the open-source server monitoring tool Nezha for stealthy remote access to compromised systems. This tool, which is intended for legitimate server monitoring, is being misused to gain control over systems without detection. Organizations that utilize Nezha may find themselves vulnerable to these types of attacks if they do not implement proper security measures. The exploitation of such tools emphasizes the need for users to secure their systems and monitor for unusual activity. As attackers continue to find new ways to exploit legitimate software, it becomes crucial for companies to stay informed and proactive about their cybersecurity practices.

Impact: Nezha monitoring tool
Remediation: Organizations should review their use of Nezha, ensure proper security configurations, and monitor for unauthorized access. Regular updates and security patches should be applied to mitigate risks.
Read Original

In a significant crackdown on cybercrime across Africa, law enforcement agencies from 19 countries arrested 574 individuals and seized around $3 million. This operation, called Operation Sentinel, ran for a month from October 27 to November 27 and focused on major cyber threats including business email compromise, digital extortion, and ransomware. Ghana was notably involved in the operation, with over 100 digital devices confiscated in connection with various cyber-fraud cases. This coordinated effort demonstrates a strong commitment to combating the rise of cybercrime in the region, which poses increasing risks to both individuals and businesses. The collective actions taken during this initiative aim to disrupt criminal networks that exploit technology for fraudulent activities.

Impact: N/A
Remediation: N/A
Read Original

The U.S. Department of Justice has charged 54 individuals involved in a significant ATM jackpotting scheme that reportedly stole millions of dollars. This criminal operation utilized malware known as Ploutus to manipulate ATMs across the United States, causing them to dispense cash unlawfully. Many of those indicted are linked to Tren de Aragua, a criminal group based in Venezuela. The actions of these individuals not only affect financial institutions but also threaten the security and trust of ATM users nationwide. This case underscores the ongoing risks posed by sophisticated cybercrime networks that exploit vulnerabilities in financial systems.

Impact: Automated Teller Machines (ATMs), specifically those susceptible to Ploutus malware.
Remediation: Financial institutions should enhance ATM security measures, including regular software updates and monitoring for unusual transaction patterns.
Read Original
PreviousPage 3 of 7Next