HomeSample Page

Sample Page Title


Ravie LakshmananFeb 23, 2026Cybersecurity / Hacking

Double-Faucet Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & Extra

Safety information not often strikes in a straight line. This week, it feels extra like a collection of sharp turns, some taking place quietly within the background, others enjoying out in public view. The small print are totally different, however the strain factors are acquainted.

Throughout gadgets, cloud providers, analysis labs, and even on a regular basis apps, the road between regular conduct and hidden danger retains getting thinner. Instruments meant to guard, replace, or enhance techniques are additionally turning into pathways when one thing goes unsuitable.

This recap gathers the alerts in a single place. Fast reads, actual influence, and developments that deserve a better look earlier than they change into subsequent week’s larger downside.

⚡ Risk of the Week

Dell RecoverPoint for VMs Zero-Day Exploited — A most severity safety vulnerability in Dell RecoverPoint for Digital Machines has been exploited as a zero-day by a suspected China-nexus menace cluster dubbed UNC6201 since mid-2024. The exercise includes the exploitation of CVE-2026-22769 (CVSS rating: 10.0), a case of hard-coded credentials affecting variations prior to six.0.3.1 HF1. Per Google, the hard-coded credential pertains to an “admin” person for the Apache Tomcat Supervisor occasion that may very well be used authenticate to the Dell RecoverPoint Tomcat Supervisor, add an online shell named SLAYSTYLE through the “/supervisor/textual content/deploy” endpoint, and execute instructions as root on the equipment to drop the BRICKSTORM backdoor and its newer model dubbed GRIMBOLT.

🔔 Prime Information

  • Former Google Engineers Indicted Over Alleged Commerce Secret Theft — Two former Google engineers and one in every of their husbands have been indicted within the U.S. for allegedly committing commerce secret theft from the search large and different tech companies and transferring the data to unauthorized areas, together with Iran. Samaneh Ghandali, 41, and her husband Mohammadjavad Khosravi (aka Mohammad Khosravi), 40, alongside along with her sister Soroor Ghandali, 32, have been accused of conspiring to commit commerce secret theft from Google and different main expertise corporations, theft and tried theft of commerce secrets and techniques, and obstruction of justice. The defendants are mentioned to have transferred lots of of delicate recordsdata to a third-party communications platform after which accessed them from Iran after Samaneh Ghandali and Khosravi traveled to Iran in December 2023.
  • PromptSpy Android Malware Abuses Gemini for Persistence — Researchers at ESET analyzed what they described as the primary Android malware to leverage generative synthetic intelligence (AI) throughout its execution to arrange persistence. Known as PromptSpy, the malware makes use of Google Gemini to investigate the present display and supply step-by-step directions on how to make sure the malicious app stays pinned within the current apps checklist by making the most of the working system’s accessibility providers. There are indicators that the marketing campaign is probably going focusing on customers in Argentina. Google instructed The Hacker Information that it didn’t discover any apps containing the malware being distributed through Google Play.
  • Kenyan Dissident’s Telephone Cracked Utilizing Cellebrite’s Instrument — Proof has emerged that Kenyan authorities used a business forensic extraction device manufactured by Israeli firm Cellebrite to interrupt right into a outstanding dissident’s telephone. The Citizen Lab mentioned it discovered the indications on a private telephone belonging to Boniface Mwangi, a Kenyan pro-democracy activist who has introduced plans to run for president in 2027. In a associated growth, Amnesty Worldwide discovered that the iPhone belonging to Teixeira Cândido, an Angolan journalist and press freedom advocate, was efficiently focused by Intellexa’s Predator spy ware in Could 2024 after he opened an contaminated hyperlink acquired through WhatsApp.
  • New Pre-Put in Android Malware Keenadu Detected within the Wild — A brand new Android backdoor that is embedded deep into the system firmware can silently harvest knowledge and remotely management its conduct, Kaspersky mentioned. The malware, codenamed Keenadu, is alleged to have been delivered by way of compromised firmware by an over-the-air (OTA) replace. This technique permits it to run with excessive privileges from the second the system is activated, offering attackers with intensive management over the system. It could possibly additionally infect different put in apps, deploy extra software program from APK recordsdata, and grant these apps any permission obtainable on the system. As soon as lively, Keenadu inherits elevated permissions and operates with minimal visibility. The malware triggers solely below particular situations, remaining dormant on gadgets set to Chinese language languages or time zones and on those who lack the Google Play Retailer and Google Play Providers. Nevertheless, Keenadu’s distribution will not be restricted to pre-installed system elements. In some instances, the malware has additionally been noticed embedded inside purposes distributed by Android app shops. That mentioned, there’s little or no a person can do when a chunk of malware comes pre-installed on their model new Android pill. As a result of the malicious elements are current in firmware moderately than put in later as apps, affected customers might have restricted capability to detect or take away them by standard strategies. The exercise has not been attributed to a selected menace actor, however Kaspersky mentioned the builders demonstrated “a deep understanding of the Android structure, the app startup course of, and the core safety ideas of the working system.”
  • Password Managers’ Zero Data Claims Put to Take a look at — A brand new examine undertaken by researchers from ETH Zurich and Università della Svizzera italiana has undermined claims from Bitwarden, Dashlane, and LastPass that the password managers assure “zero data” — an assurance that states there isn’t any approach for a malicious insider or a menace actor that has compromised the cloud infrastructure to entry the vault knowledge. Particularly, it discovered that these claims aren’t true below all circumstances, notably when account restoration is in place, or password managers are set to share vaults or arrange customers into teams. Probably the most extreme of the assaults, focusing on Bitwarden and LastPass, may enable an insider or attacker to learn or write to the contents of whole vaults. Different assaults allow studying and modification of shared vaults. “Assaults on the supplier server infrastructure may be prevented by fastidiously designed operational safety measures, however it’s effectively throughout the bounds of motive to imagine that these providers are focused by refined nation-state-level adversaries, for instance through software program supply-chain assaults or spear-phishing,” the researchers mentioned.

‎️‍🔥 Trending CVEs

New vulnerabilities floor every day, and attackers transfer quick. Reviewing and patching early retains your techniques resilient.

Listed below are this week’s most crucial flaws to verify first — CVE-2026-22769 (Dell RecoverPoint for Digital Machines), CVE-2026-25926 (Notedpad++), CVE-2026-26119 (Microsoft Home windows Admin Middle), CVE-2026-2329 (Grandstream GXP1600 collection), CVE-2025-65717 (Reside Server), CVE-2026-1358 (Airleader Grasp), CVE-2026-25108 (FileZen), CVE-2026-25084, CVE-2026-24789 (ZLAN), CVE-2026-2577 (Nanobot), CVE-2026-25903 (Apache NiFi), CVE-2026-26019 (@langchain/group), CVE-2026-1670 (Honeywell CCTV), CVE-2025-7740 (Hitachi Power SuprOS), CVE-2025-61928 (better-auth), CVE-2026-20140 (Splunk Enterprise for Home windows), CVE-2026-27118 (@sveltejs/adapter-vercel), CVE-2026-27099, CVE-2026-27100 (Jenkins), CVE-2026-24733 (Apache Tomcat), CVE-2026-2648, CVE-2026-2649, CVE-2026-2650 (Google Chrome), CVE-2025-29969 (Home windows Fundamentals), CVE-2025-64127, CVE-2025-64128, CVE-2025-64129, CVE-2025-64130 (Zenitel), CVE-2025-32355, CVE-2025-59793 (TRUfusion Enterprise), CVE-2026-1357 (WPvivid Backup plugin), CVE-2025-9501 (W3 Whole Cache plugin), CVE-2025-13818 (ESET Administration Agent for Home windows), CVE-2025-11730 (ZYXEL ATP/USG collection), CVE-2025-67303 (ComfyUI), and Joomla! unauthenticated file learn, unauthenticated file deletion, and SQL injection vulnerabilities in Novarain/Tassos Framework (no CVEs).

🎥 Cybersecurity Webinars

  • Study Easy methods to Future-Proof Your Encryption Earlier than Quantum Breaks It → Quantum computing is accelerating, and attackers are harvesting encrypted knowledge for future decryption. This webinar covers sensible post-quantum cryptography, hybrid encryption, and Zero Belief methods to guard delicate knowledge earlier than quantum threats change into actual.
  • Past the Mannequin: Securing AI Brokers in Actual-World Programs → As organizations deploy autonomous AI brokers with device entry and system permissions, the assault floor shifts past the mannequin itself. This session explores oblique immediate injection, privilege escalation, multi-agent danger, and sensible methods to safe real-world AI techniques with out breaking workflows.
  • Strain-Take a look at Your Controls With Steady CTI-Pushed Validation → Safety budgets are rising, but breaches proceed. This session reveals tips on how to transfer past assumption-based testing to steady, CTI-driven publicity validation—pressure-testing controls towards actual attacker conduct, automating safety checks, and constructing measurable resilience with out overspending.

📰 Across the Cyber World

  • On-line Retailer Contaminated with Skimmer — The net retailer of a top-10 international grocery store chain has been contaminated with a skimmer malware that scans for admin customers for WordPress, Magento, PrestaShop, and OpenCart to evade detection. “The assault combines two elements: a seemingly off-the-shelf skimmer framework with integrations for 4 widespread e-commerce platforms, and a fastidiously localized pretend fee kind,” Sansec mentioned. “This fraud is known as ‘double-tap skimming’: prospects enter their card particulars into the pretend kind first, then see the true fee kind the place they must enter their knowledge once more. Most individuals simply settle for that and full the order, unaware their knowledge was simply stolen.” The breach coincides with a broader wave of assaults focusing on PrestaShop shops. In January 2026, PrestaShop urged retailers to verify their shops for skimmers injected into theme template recordsdata.
  • Nigeria Arrests 7 for Operating Rip-off Middle — Nigerian authorities arrested seven suspects who ran a cyber rip-off middle within the metropolis of Agbor. The group used social media advertisements to lure U.Ok. victims to bogus crypto funding portals. A whole bunch of faux Fb accounts have been probably used to focus on victims. “Utilizing these bogus social media accounts to impersonate cryptocurrency merchants, they focused individuals who used legit funding platforms, sharing false optimistic opinions to lure folks into sending cash to the fraudsters,” the U.Ok. Nationwide Crime Company (NCA) mentioned. Meta mentioned it is working with legislation enforcement to determine and take away all accounts utilized in these operations. “The group used pretend social media accounts impersonating cryptocurrency merchants, together with fraudulent Fb teams that includes fabricated testimonials, to focus on people partaking with legit funding platforms,” it added. Within the first half of 2025, the corporate famous it took down 12 million accounts throughout Fb, Instagram, and WhatsApp related to felony rip-off facilities.
  • LonTalk Protocol Analyzed — Claroty has known as consideration to safety dangers posed by the LonTalk proprietary protocol that is used for device-to-device communication in constructing administration and automation techniques (BMS and BAS). “LonTalk shouldn’t be underestimated as an assault vector for hacktivists and felony entities, particularly as BMS is enabled over IP networks,” the corporate mentioned. “LonTalk is actually nonetheless related to BMS cybersecurity discussions, particularly as BMS finds its approach on-line for a lot of strategic and bottom-line causes. Business actual property, retail, hospitality, and knowledge middle sectors depend on BMS techniques comparable to HVAC (heating, air flow, and air-con), lighting, power administration, and safety. Beforehand, these techniques have been operated independently by facility administration, however they’re now more and more related and built-in by superior BMS and BAS capabilities.”
  • GrayCharlie Makes use of Compromised WordPress Websites to Ship RATs — A menace actor often known as GrayCharlie (aka HANEYMANEY, SmartApeSG, and ZPHP) has been noticed compromising WordPress websites and injecting them with hyperlinks to externally hosted JavaScript that redirects guests to NetSupport RAT payloads delivered through pretend browser replace pages or ClickFix mechanisms. The menace first emerged in mid-2023. “These infections typically progress to the deployment of StealC and SectopRAT,” Recorded Future mentioned. Whereas most compromised web sites seem like opportunistic and span quite a few industries, the cybersecurity firm mentioned it recognized a cluster of U.S. legislation agency websites that have been probably compromised round November 2025, probably by a provide chain assault involving a shared IT supplier.
  • Why Patch Every part is a Recipe for Burnout — Dataminr’s 2026 Cyber Risk Panorama Report has revealed that the “patching treadmill is damaged,” pushed by reliance on CVSS scores and a surge in patch bypasses, the place distributors do not deal with the basis causes of points, thereby opening the door to re-exploitation by menace actors days or even weeks after the preliminary patch was launched. “With hundreds of CVEs disclosed yearly, safety groups can’t simply depend on the widespread vulnerability severity rating (CVSS) to resolve what to patch,” Dataminr mentioned. “These scores concentrate on the technical impacts of a vulnerability, however let you know little or no about precise danger to your group. There must be a stability between the CVSS, potential financial influence, publicity, and chance of being focused. The main focus has to shift from ‘is that this a essential CVE?’ to ‘is that this particular flaw being focused in my sector, and might the attacker truly attain my crown jewels by it?'”
  • Phishing Campaigns in Taiwan Ship Winos 4.0 — Concentrating on phishing campaigns have focused Taiwan with themes designed to take advantage of native enterprise processes and in the end ship a recognized distant entry trojan known as Winos 4.0 (aka ValleyRAT) and malicious plugins by weaponized attachments or embedded hyperlinks. “The lures mimic official communications, comparable to tax audit notifications, tax submitting software program installers, and cloud-based e-invoice downloads,” Fortinet FortiGuard Labs mentioned. “Over the previous two months, now we have recognized varied supply methods, together with malicious LNK recordsdata used for a downloader, DLL side-loading through legit executables to load shellcode, and BYOVD (Carry Your Personal Susceptible Driver) assaults utilizing ‘wsftprm.sys.'” The driving force is used to terminate processes related to a hard-coded checklist of safety merchandise. The usage of Winos 4.0 is exclusive to a Chinese language cybercrime group often known as Silver Fox.
  • Groups Will get Model Impersonation Safety — Microsoft mentioned it is going to begin rolling out Model Impersonation Safety for Groups Calling beginning mid-March 2026 to detect and warn customers of suspicious exterior calls to scale back fraud dangers. “It will likely be enabled by default, requires no admin motion, and goals to reinforce safety with out altering current insurance policies,” Microsoft mentioned. The tech large can be planning to introduce a “Report a Name” function by mid-March 2026 to let customers flag suspicious one-to-one calls.
  • 2025 Information 508 ICS advisories from CISA — Between March 2010 and January 31, 2026, CISA/ICS-CERT printed 3,637 ICS advisories about 12,174 vulnerabilities affecting 2,783 merchandise from 689 distributors, Forescout mentioned. 2025 recorded a excessive of 508 ICS advisories, overlaying 2,155 vulnerabilities throughout varied merchandise and distributors. The event marks the primary 12 months exceeding 500 advisories. The typical severity rose to a CVSS rating of 8.07 and 82% of advisories have been categorised as excessive or essential. In distinction, again in 2010, the common was 6.44, and it was categorised as medium severity.
  • Microsoft Unveils LiteBox — Microsoft has launched LiteBox, a Rust-based venture described as a “sandboxing library OS that drastically cuts down the interface to the host, thereby lowering assault floor.” Developed in collaboration with the Linux Virtualization Primarily based Safety (LVBS) venture, the purpose is to sandbox purposes by minimizing host system interactions and supporting varied use instances like operating Linux applications on Home windows or sandboxing Linux purposes.
  • ChainedShark Targets Chinese language Analysis Sector — A brand new APT group codenamed ChainedShark is focusing on China’s tutorial and scientific analysis sector. Energetic since Could 2024, the group’s essential focus has been the gathering of intelligence on Chinese language diplomacy and marine expertise. Previous victims embody universities and analysis establishments specializing in worldwide relations. Its arsenal integrates N-day vulnerability exploits and extremely complicated customized trojans comparable to LinkedShell. “ChainedShark displays clear geopolitical motivations, focusing its assaults on specialists and students in worldwide relations and marine sciences inside Chinese language tutorial and analysis establishments,” NSFOCUS mentioned. “The group demonstrates robust social engineering capabilities, crafting fluent, pure, and high-quality Chinese language-language lures. It skillfully exploits skilled eventualities—comparable to convention invites and tutorial call-for-papers—to create misleading assault vectors, successfully reducing targets’ guard.”
  • Samsung Climate App as a Approach for Person Fingerprinting — New analysis has uncovered that Samsung’s pre-installed climate app is fingerprinting its customers by way of a “placeid” parameter that is trivially observable by the climate API supplier. A take a look at carried out on 42 Samsung gadgets discovered that the fingerprints have been distinctive per system and survived IP modifications throughout suppliers and VPN use. “Evaluation of 9,211 climate API requests from 42 Samsung system homeowners over 5 days demonstrates that placeid mixtures produce distinctive person identifiers in 96.4% of instances,” Buchodi’s Risk Intel mentioned. “Each person with two or extra saved areas had a fingerprint shared by nobody else within the dataset.” This, in flip, turns saved areas right into a persistent cross-session monitoring identifier, as every placeid identifies a singular location. The fingerprint represents an mixture of all placeid values related to a tool’s saved areas. In different phrases, a person monitoring a mixture of greater than two or three areas may be uniquely recognized.
  • DDoS Assaults Bounce 168% in 2025 — A new evaluation launched by Radware has revealed that the variety of net DDoS assaults climbed 101.4% in 2025 in comparison with 2024, and dangerous bot exercise elevated 91.8%, fueled by generative AI instruments. Malicious net utility and API transactions rose 128% 12 months over 12 months. Community-layer DDoS assaults elevated 168.2% 12 months over 12 months, with peak assault volumes reaching nearly 30 terabits per second (Tbps). “Expertise, telecommunications, and monetary providers have been probably the most focused sectors, collectively accounting for almost all of large-scale community DDoS campaigns,” Radware mentioned. “The expertise sector alone represented 45% of all network-layer DDoS assaults, up sharply from 8.77% in 2024.” Hacktivism, fueled by geopolitical and ideological battle, remained a major driver of DDoS exercise.
  • Over 2,500 Malicious Photographs Flagged on Docker Hub — Qualys mentioned it found greater than 2,500 malicious pictures hosted on the Docker Hub. Of those, round 70% of them contained a hidden cryptominer. Others included backdoors, exploits, ransomware, keyloggers, and proxy infrastructure. “Pulling container pictures from public registries is now not a impartial operational step,” the corporate mentioned. “It’s a belief resolution that instantly impacts infrastructure stability, cloud prices, and safety danger.”
  • Practically 1T Rip-off Adverts Served on Social Media in 2025 — In line with new findings from Juniper Analysis, on-line tech platforms made £3.8 billion ($5.2 billion) in income from malicious or rip-off advertisements in Europe alone. Practically 1 trillion rip-off advertisements have been served to social media customers in 2025. The analyst agency additionally revealed earlier this month that e-commerce fraud will rise from $56bn in 2025 to $131 billion in 2030, posting a 133% improve over the interval.
  • Malicious npm Packages Hijack Playing Outcomes — Researchers have found malicious npm packages, json-bigint-extend, jsonfx, and jsonfb, that mimic the legit json-bigint library, however include performance to put in two backdoors to execute extra code fetched from an endpoint, run arbitrary SQL instructions, obtain file contents, and checklist server-side recordsdata and directories. “Upon additional inspection of the fetched code, it appears to be a fancy cashflow-rewriting system used to control a playing recreation,” Aikido mentioned. “Probably the most refined element of this backdoor is the fixFlow operate, a stability manipulation engine that retroactively rewrites a person’s playing historical past to attain a desired stability change whereas sustaining the looks of legit gameplay.” It is suspected that the malware is designed to focus on a playing app named Bappa Rummy. It is now not listed on the official Google Play Retailer.
  • Telegram Disputes Claims About Encryption — The pinnacle of Russia’s FSB safety service accused Telegram of harboring felony exercise and failing to behave on experiences from Russian authorities. Bortnikov mentioned Telegram ignored greater than 150,000 requests for removing from Russian authorities. Russian officers additionally claimed that overseas intelligence providers may learn messages despatched by Russian troopers over the app. The messaging platform mentioned “no breaches of Telegram’s encryption have ever been discovered.” The event comes as Russia began blocking and throttling Telegram visitors final week.
  • Nigerian Man Sentenced to Eight Years in Jail for Bogus Tax Refund Scheme — A 37-year-old Nigerian man named Matthew A. Akande, who was residing in Mexico, was sentenced to eight years in jail within the U.S. for his involvement in a felony operation that concerned unauthorized entry to the pc networks of tax preparation companies in Massachusetts. Between in or about June 2016 and June 2021, Akande conspired to make use of stolen taxpayer data to file over 1,000 fraudulent tax returns in search of thousands and thousands of {dollars} in tax refunds, the Justice Division mentioned. The defendant was additionally ordered to pay $1,393,230 in restitution. He was arrested in October 2024 within the U.Ok. and extradited to the U.S. in March 2025. “To hold out the scheme, Akande prompted fraudulent phishing emails to be despatched to 5 Massachusetts tax preparation companies,” the division mentioned. The emails presupposed to be from a potential shopper in search of the tax preparation companies’ providers, however in reality have been used to trick the companies into downloading distant entry trojan malicious software program (RAT malware), together with malware often known as Warzone RAT. Akande used the RAT malware to acquire the PII and prior 12 months tax data of the tax preparation companies’ purchasers, which Akande then used to trigger fraudulent tax returns to be filed in search of refunds.” Warzone RAT’s infrastructure was seized by the U.S. Federal Bureau of Investigation in February 2024.
  • New Campaigns Distribute njRAT, Pulsar RAT, XWorm, and Prometei — In a brand new marketing campaign, menace actors are leveraging the njRAT distant entry trojan to ship the MassLogger infostealer. One other marketing campaign has been discovered to make use of a Donut loader to distribute Pulsar RAT as a part of a classy, multi-stage malware assault. What’s notable about this exercise is that Pulsar RAT is used to actively management a compromised host, permitting an attacker to provoke a real-time chat session with the sufferer to work together and probe system utilization. Additionally found are two campaigns utilizing phishing emails to distribute XWorm: One makes use of a JavaScript dropper to focus on Brazilian customers, and one other begins with phishing emails delivering a malicious Excel attachment to focused customers. The Excel file exploits CVE-2018-0802, a reminiscence corruption flaw in Workplace patched in 2018, to obtain and execute an HTA file on the sufferer’s system, which, in flip, triggers PowerShell to obtain and run a fileless .NET module instantly into reminiscence. The module then makes use of course of hollowing to inject and execute the XWorm payload inside a newly created MSBuild.exe course of. Final however not least, Home windows servers are being focused by menace actors to contaminate them with a botnet often known as Prometei. “It options intensive capabilities, together with distant management performance, credential harvesting, crypto-mining (Monero), lateral motion, command-and-control (C2) over each the clearweb and TOR community, and self-preservation measures that harden compromised techniques towards different menace actors, to take care of unique entry,” eSentire mentioned.

🔧 Cybersecurity Instruments

  • Gixy Subsequent → It’s an open-source safety evaluation device designed to audit NGINX configurations for widespread misconfigurations and vulnerabilities. It scans configuration recordsdata to detect points comparable to unsafe directives, incorrect entry controls, and insecure proxy settings that might expose purposes to assaults. Constructed as a successor to the unique Gixy venture, it goals to offer up to date checks and improved rule protection for contemporary NGINX deployments.
  • The-One-WSL-BOF → It’s an open-source Cobalt Strike Beacon Object File that lets operators work together with Home windows Subsystem for Linux (WSL) instantly from a Beacon session. It could possibly checklist WSL distributions and run instructions inside them with out launching wsl.exe, lowering seen course of exercise and a few logging artifacts.

Disclaimer: These instruments are supplied for analysis and academic use solely. They aren’t security-audited and should trigger hurt if misused. Assessment the code, take a look at in managed environments, and adjust to all relevant legal guidelines and insurance policies.

Conclusion

If one theme runs by this week, it’s quiet publicity. Threat is displaying up in routine updates, trusted instruments, and options most groups not often query till one thing breaks.

The actual problem will not be a single flaw however the sample beneath it. Small weaknesses are being chained collectively and scaled with automation quicker than defenders can modify.

Scan the total checklist fastidiously. One in all these quick updates will probably map nearer to your personal setting than it first seems.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles