Articles tagged "Exploit"

Found 317 articles

North Korean hackers, previously linked to the Axios supply chain attack, are now targeting prominent maintainers of Node.js in a social engineering campaign. These attackers are using deceptive tactics to compromise the accounts of these developers, potentially putting the security of the Node.js ecosystem at risk. This is concerning because Node.js is widely used in web development, and any breach could lead to widespread vulnerabilities in applications that rely on its libraries. Developers and organizations that utilize Node.js should be on high alert and take precautions to protect their accounts and code repositories. The ongoing targeting of developers reflects a broader trend of cybercriminals seeking to exploit trusted software maintainers to gain access to critical systems.

Impact: Node.js maintainers, potentially affecting the Node.js ecosystem and applications relying on it.
Remediation: Developers should enable two-factor authentication, regularly update their passwords, and be cautious of unsolicited communications.
Read Original

Hackers are actively exploiting a vulnerability known as React2Shell (CVE-2025-55182) to automate the theft of user credentials from Next.js applications. This attack targets systems that have not been updated or patched against this specific vulnerability, making them susceptible to unauthorized access. Researchers have observed that this campaign is widespread, indicating that many developers using vulnerable versions of Next.js may be at risk. The implications are significant, as stolen credentials can lead to account takeovers and further breaches within organizations. Companies using Next.js should prioritize updating their applications to mitigate this threat and protect user data.

Impact: Next.js applications vulnerable to React2Shell (CVE-2025-55182)
Remediation: Developers should update Next.js applications to the latest version that addresses the React2Shell vulnerability. Regularly check for security updates and apply patches as they become available to prevent exploitation.
Read Original
Actively Exploited

Recent findings show that the Akira ransomware group has become more efficient in executing attacks, significantly shortening the time it takes to compromise systems. This development poses a serious risk to organizations, as attackers are now able to exploit vulnerabilities and deploy ransomware more quickly than before. The report from CyberScoop indicates that businesses need to be increasingly vigilant, as traditional defenses may no longer be sufficient against this evolving threat. Companies are urged to review their cybersecurity measures and ensure they are up to date with the latest defenses to mitigate potential attacks. The growing speed of these intrusions could lead to increased financial and operational damage for those caught off guard.

Impact: N/A
Remediation: Organizations should enhance their cybersecurity protocols, including regular software updates, employee training on phishing attacks, and the implementation of advanced threat detection systems.
Read Original
AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Mercor, an AI firm, has confirmed a significant data breach linked to a supply chain attack involving LiteLLM. Hackers claim to have stolen 4TB of sensitive data, which may include internal systems and proprietary information. This breach raises serious concerns about the security of supply chain processes, as attackers often exploit vulnerabilities in third-party software to gain access to larger networks. Companies that rely on LiteLLM and similar technologies should be particularly vigilant and assess their security measures. The implications of such a large data theft could be severe, affecting not only Mercor but also its clients and partners who may be at risk of data exposure or further attacks.

Impact: LiteLLM supply chain, Mercor's internal systems, sensitive data
Remediation: Companies should review their supply chain security practices, implement stronger access controls, and monitor for unusual activity. Specific patches or updates were not mentioned.
Read Original

Drift, a company involved in cryptocurrency, has suffered a significant loss of $285 million due to a sophisticated hacking operation likely orchestrated by North Korean cybercriminals. The attackers employed advanced techniques, including the use of nonce-based tricks to pre-sign transactions and delay approvals, allowing them to bypass security measures. This incident raises alarms about the vulnerabilities in cryptocurrency platforms and the potential for state-sponsored actors to exploit these weaknesses for financial gain. The scale of the theft not only impacts Drift but also poses broader implications for the cryptocurrency market, as it highlights the ongoing risks of cyberattacks in this rapidly evolving sector. As companies like Drift face these threats, it becomes crucial for the industry to bolster security measures to protect against such sophisticated attacks.

Impact: Drift cryptocurrency platform
Remediation: Companies should enhance security protocols, including transaction verification and multisig approval processes.
Read Original

A significant credential harvesting campaign has been detected, utilizing the React2Shell vulnerability (CVE-2025-55182) to gain access to sensitive data from 766 Next.js hosts. Attackers are stealing various credentials, including database logins, SSH private keys, AWS secrets, Stripe API keys, and GitHub tokens. This operation has been linked to a threat group that Cisco Talos is monitoring. The widespread nature of this breach is concerning, as it affects a range of developers and companies using Next.js, potentially compromising their applications and user data. Companies need to be vigilant and take immediate steps to secure their systems against this threat.

Impact: Next.js hosts, database credentials, SSH private keys, Amazon Web Services (AWS) secrets, Stripe API keys, GitHub tokens.
Remediation: Organizations should patch their systems to address the React2Shell vulnerability (CVE-2025-55182) and implement security best practices such as limiting access to sensitive credentials, regularly rotating keys and secrets, and monitoring for unauthorized access attempts.
Read Original

A Brazilian cybercrime group known as Augmented Marauder and Water Saci has launched a phishing campaign that spreads two banking trojans: Casbaneiro and Horabot. The attackers use a mix of WhatsApp, ClickFix techniques, and email phishing to deliver these malicious programs. The campaign primarily targets individuals and organizations, aiming to steal sensitive banking information. This is particularly concerning as it showcases the evolving tactics employed by cybercriminals to exploit users through familiar communication channels. Users should be cautious about unsolicited messages and verify the authenticity of links before clicking.

Impact: Casbaneiro and Horabot banking trojans
Remediation: Users should be wary of phishing attempts, avoid clicking on suspicious links, and ensure their security software is up to date.
Read Original

Recent reports indicate that ransomware attackers are increasingly using legitimate IT tools, such as Process Hacker and IOBit Unlocker, to bypass traditional antivirus software. These tools have deep access to operating system functions, allowing attackers to execute malicious activities without raising alarms. This trend poses significant risks to organizations, as it makes it harder for security systems to detect and prevent these kinds of attacks. Companies must reassess their security measures to account for the misuse of legitimate software, which could compromise sensitive data and disrupt operations. As attackers continue to evolve their tactics, it’s crucial for users and companies to stay vigilant and update their defenses accordingly.

Impact: Process Hacker, IOBit Unlocker
Remediation: Companies should enhance monitoring of system processes, implement stricter access controls, and regularly update their security software to recognize and mitigate the risks posed by legitimate tools being misused.
Read Original

Hackers have exploited a zero-day vulnerability in TrueConf conference servers, which enables them to execute arbitrary files on all connected endpoints. This means that attackers can potentially install malicious software on users' devices without their knowledge. The vulnerability poses a significant risk to organizations using TrueConf for video conferencing, especially as it allows for remote execution of harmful code. Users of TrueConf should be particularly vigilant and consider updating their systems to protect against these types of attacks. Security researchers are urging companies to monitor their networks for any suspicious activity related to this vulnerability.

Impact: TrueConf conference servers
Remediation: Users should update their TrueConf software to the latest version as soon as a patch is available, and monitor their systems for unauthorized access.
Read Original
Ransomware Groups Exploit Legit IT Tools to Bypass Antivirus

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Recent research from Seqrite has revealed that ransomware groups are increasingly using legitimate IT tools, such as IOBit Unlocker, to bypass antivirus software. This tactic, known as the 'dual-use dilemma,' allows attackers to exploit trusted software to carry out their malicious activities without raising immediate alarms. By repurposing these tools, they enhance their chances of successfully infiltrating systems and encrypting data for ransom. This trend poses a significant risk to organizations that rely on these tools for legitimate purposes, as it complicates detection and response efforts. As cybercriminals continue to adapt their methods, companies must remain vigilant and consider revising their security measures to account for the misuse of legitimate software.

Impact: IOBit Unlocker, antivirus software
Remediation: Companies should enhance their endpoint security measures, conduct regular audits of software usage, and educate employees on the risks associated with using third-party tools.
Read Original
Actively Exploited

Google has addressed 21 vulnerabilities in its Chrome browser, including a serious zero-day flaw identified as CVE-2026-5281. This vulnerability is categorized as a use-after-free (UAF) issue in Dawn, which is part of the WebGPU standard utilized by Chromium and its derivatives. While specific details about the exploitation of this flaw are scarce, the fact that it has been flagged as 'in-the-wild' suggests that attackers are actively using it. Users of Chrome and other Chromium-based browsers should ensure they are running the latest versions to protect themselves from potential attacks. Keeping browsers updated is crucial because such vulnerabilities can lead to unauthorized access or other malicious activities.

Impact: Google Chrome, Chromium-based browsers, Dawn (WebGPU implementation)
Remediation: Users should update their Chrome browsers to the latest version to mitigate the risks associated with CVE-2026-5281.
Read Original

SentinelOne's AI technology successfully thwarted a supply chain attack involving a compromised LiteLLM package, stopping the malicious code within seconds. The incident occurred when a user unknowingly installed the tainted package, which was triggered by the Claude Code tool. SentinelOne's macOS agent detected the malicious process chain and intervened automatically, preventing any further damage. This event illustrates the ongoing risks associated with supply chain vulnerabilities, as attackers often exploit trusted software components to infiltrate systems. Companies using LiteLLM or similar packages should review their security measures to guard against such threats.

Impact: LiteLLM, macOS systems
Remediation: Users should ensure their security software is updated to the latest version and monitor for any unusual activity related to LiteLLM installations.
Read Original

Anthropic has reported an accidental leak of the source code for its closed-source AI model, Claude Code, through an NPM package. The company clarified that while the source code was exposed, there was no breach of customer data or credentials. This incident raises concerns about the protection of proprietary technology, especially since the source code could potentially allow others to replicate or exploit the functionalities of Claude Code. While no immediate risks to users have been identified, the leak highlights the importance of stringent security measures when handling sensitive software components. Companies must remain vigilant to prevent similar incidents in the future.

Impact: Claude Code source code
Remediation: N/A
Read Original

Researchers from Check Point have identified a vulnerability in ChatGPT that could allow a malicious user to exploit a hidden outbound channel within the platform's code execution runtime. They found that a single, specially crafted prompt could trigger this channel, potentially leading to unauthorized data leakage. This issue raises concerns for users and organizations relying on ChatGPT for various applications, as it could expose sensitive information. Following the discovery, OpenAI has patched the vulnerability to address this security flaw. Users of ChatGPT should ensure they are using the latest version to benefit from the fix and safeguard their data.

Impact: ChatGPT
Remediation: OpenAI has patched the vulnerability.
Read Original

A recent report reveals that credential theft is a significant factor driving various cyberattacks, including ransomware incidents and breaches of Software-as-a-Service (SaaS) platforms. This trend indicates a shift in focus for cybersecurity efforts, moving from merely preventing breaches to actively detecting and responding to the misuse of legitimate access credentials. The report emphasizes that attackers are increasingly using stolen logins to carry out sophisticated attacks, which complicates the security landscape for many organizations. As a result, businesses must enhance their monitoring capabilities to identify unauthorized use of accounts and protect sensitive information. This shift is particularly crucial as nation-state actors also exploit these vulnerabilities for geopolitical purposes, further elevating the stakes in cybersecurity.

Impact: Ransomware, SaaS platforms, Industrial systems, Nation-state attacks
Remediation: Organizations should implement stronger monitoring of account access, multi-factor authentication, and regular audits of user activity to mitigate risks associated with credential theft.
Read Original
PreviousPage 4 of 22Next