<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security News</title>
	<atom:link href="https://cybersecuritynews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cybersecuritynews.com/</link>
	<description>World&#039;s #1 Premier Cybersecurity and Hacking News Portal</description>
	<lastBuildDate>Mon, 20 Apr 2026 02:34:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cybersecuritynews.com/wp-content/uploads/2025/12/cropped-CSN-Favico-32x32.webp</url>
	<title>Cyber Security News</title>
	<link>https://cybersecuritynews.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">192061645</site>	<item>
		<title>Vercel Confirms Data Breach — Hackers Claim Access to Internal Systems</title>
		<link>https://cybersecuritynews.com/vercel-data-breach/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 02:29:11 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[data breach]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147861</guid>

					<description><![CDATA[<p>Vercel has disclosed a significant security incident after threat actors gained unauthorized access to internal systems, with a hacker group reportedly attempting to sell stolen data for $2 million on underground forums. Vercel, one of the most widely used frontend cloud platforms powering millions of developer deployments, confirmed the breach in an official security bulletin [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/vercel-data-breach/">Vercel Confirms Data Breach — Hackers Claim Access to Internal Systems</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Vercel has disclosed a significant security incident after threat actors gained unauthorized access to internal systems, with a hacker group reportedly attempting to sell stolen data for $2 million on underground forums.</p>



<p>Vercel, one of the most widely used frontend cloud platforms powering millions of developer deployments, confirmed the breach in an official security bulletin published on April 18–19, 2026.</p>



<p>The company stated it is actively investigating the incident with the help of cybersecurity firm Mandiant and has notified law enforcement authorities.</p>



<p>The intrusion traces back to a <a href="https://cybersecuritynews.com/new-context-compliance-attack-jailbreaks-ai-models/" target="_blank" rel="noreferrer noopener">compromise of Context.ai, a third-party AI tool</a> used by a Vercel employee. Attackers leveraged a malicious or compromised Google Workspace OAuth app associated with Context.ai to hijack the employee&#8217;s Google Workspace account.</p>



<p>Once inside, the threat actors pivoted to access select Vercel environments and read non-sensitive environment variables from a limited number of customer configurations.</p>



<p>Vercel confirmed that environment variables explicitly marked as &#8220;sensitive,&#8221; which are stored in a manner that prevents them from being read, showed no evidence of being accessed.</p>



<p>However, any variables not marked sensitive and containing secrets such as API keys, tokens, database credentials, or signing keys should be treated as potentially exposed and rotated immediately.</p>



<p>The compromised OAuth app has been publicly identified as an indicator of compromise (IOC): <code>110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com</code>. Vercel is urging all Google Workspace administrators to immediately audit their environments for usage of this app.</p>



<h2 class="wp-block-heading" id="shinyhunters-claims-2-million-sale"><strong>ShinyHunters Claims $2 Million Sale</strong></h2>



<p>The incident escalated after a threat actor claiming to be ShinyHunters posted on BreachForums, offering Vercel&#8217;s alleged internal database, access keys, source code, employee accounts, API keys, NPM tokens, and GitHub tokens for $2 million.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgRRKt30IG8pWVxX1JpCzDpo5KIgMFWvr3JdFmIhGGriDdybydu80DzxYIpTBeMGwOEXyOtKe63QaXBH8UBpbNcRXzSIcB0GlvO5xiGUsjyaplBM3ePkjlkqJfgQ7D_Ssf6NI0-2uLTJ631imzp3ZQkZsyV35fVnwnn_eVh_hl_DfxJweJS9zHc35LKD-K/s16000/vercel%20shiny%20hunters.webp" alt="Vercel Data Breach"/><figcaption class="wp-element-caption">Shiny Hunters Claim</figcaption></figure>



<p>The attacker shared a text file containing 580 Vercel employee data records, including names, email addresses, account status, and activity timestamps, along with a screenshot of an alleged internal Vercel Enterprise dashboard as proof of access.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4m1WTvQuYZE6QXfn0-CwQDdaUPjcPLFXN8hTm_-veOMO3U9Wabvk4HPCvEJhsFrnoUiuxnlizkY2Jo47GAwJsRbDYT6ocPuFQtJYKcuyngvCifzAOQJwf2iHoFaMnqmqUPorF4kz0AxFL9fM3HR9MZGgpdtfM2L77L6hcUqZOYeqh8-ovRlodjnwLPKkD/w312-h640/sale%20claim.webp" alt="Vercel Data Breach"/><figcaption class="wp-element-caption">Shiny Hunters Claim</figcaption></figure>
</div>


<p>In messages circulated on Telegram, the threat actor also claimed to have been in direct communication with Vercel regarding a ransom demand, though Vercel has not publicly confirmed any ransom negotiations.</p>



<h2 class="wp-block-heading" id="ceo-flags-highly-sophisticated-attackers"><strong>CEO Flags Highly Sophisticated Attackers</strong></h2>



<p>Vercel CEO Guillermo Rauch characterized the threat actor as &#8220;highly sophisticated,&#8221; citing their operational velocity and detailed understanding of Vercel&#8217;s internal systems.</p>



<p>Rauch noted the attackers may have leveraged AI capabilities to accelerate their intrusion efforts, and strongly urged all customers to rotate API keys and tokens as a precautionary measure.</p>



<p>Vercel has confirmed that Next.js and its broader supply chain remain unaffected by the incident. All services are fully operational, and the company has deployed extensive protection and monitoring measures.</p>



<p>Customers who have not been directly notified by Vercel have no current evidence of credential or personal data compromise, though the investigation remains ongoing.</p>



<ul class="wp-block-list">
<li>Review activity logs in the Vercel dashboard or CLI for any suspicious behavior</li>



<li>Rotate all environment variables containing secrets that were not marked as sensitive</li>



<li>Enable the sensitive environment variables feature for all future secrets</li>



<li>Inspect recent deployments for unexpected or unauthorized changes</li>



<li>Ensure Deployment Protection is set to Standard or higher</li>



<li>Rotate Deployment Protection bypass tokens if previously configured</li>



<li>Audit Google Workspace for the identified malicious OAuth app IOC immediately</li>
</ul>



<p><a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident" target="_blank" rel="noreferrer noopener nofollow">Vercel is providing ongoing updates</a> to its security bulletin as the investigation progresses.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/vercel-data-breach/">Vercel Confirms Data Breach — Hackers Claim Access to Internal Systems</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Vercel-Data-Breach.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147861</post-id>	</item>
		<item>
		<title>Microsoft Teams Right-Click Paste Broken Following Edge Browser Update</title>
		<link>https://cybersecuritynews.com/teams-right-click-paste-broken/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Sun, 19 Apr 2026 06:48:48 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147858</guid>

					<description><![CDATA[<p>A confirmed bug in Microsoft Teams desktop client version 26072.519.4556.7438 is disabling the right-click paste option for users on Windows and macOS, with Microsoft attributing the root cause to a code regression introduced in a recent Microsoft Edge browser update. Users across organizations began reporting on April 14, 2026, that the Paste option in the [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/teams-right-click-paste-broken/">Microsoft Teams Right-Click Paste Broken Following Edge Browser Update</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A confirmed bug in <a href="https://cybersecuritynews.com/security-flaw-in-microsoft-teams/" target="_blank" rel="noreferrer noopener">Microsoft Teams desktop</a> client version 26072.519.4556.7438 is disabling the right-click paste option for users on Windows and macOS, with Microsoft attributing the root cause to a code regression introduced in a recent Microsoft Edge browser update.</p>



<p>Users across organizations began reporting on April 14, 2026, that the Paste option in the Teams desktop client&#8217;s right-click context menu was greyed out, preventing them from pasting URLs, text snippets, and images copied from tools like Snipping Tool, Outlook, Word, and Microsoft Edge.</p>



<p>Keyboard shortcuts <code>Ctrl+V</code> and <code>Cmd+V</code> on Mac continue to function normally, and the Windows clipboard (accessible via <code>Windows Key + V</code>) also behaves as expected — isolating the issue exclusively to the right-click dropdown method.</p>



<p>One of the earliest reporters noted a curious partial workaround: removing a single character from a URL (e.g., changing <code>https://</code> to <code>ttps://</code>) allowed the broken link to be pasted as plain text. Full, valid URLs, however, remained blocked from the right-click paste option.</p>



<h2 class="wp-block-heading" id="root-cause-edge-browser-regression"><strong>Edge Browser Regression</strong></h2>



<p>Microsoft confirmed in a service health notification posted on April 16, 2026, at 7:24 AM PDT that a recent update to the Microsoft Edge browser, which the Teams desktop client leverages for rendering, introduced a code regression that directly caused this paste behavior to break.</p>



<p>The Teams desktop application is built on an Electron-based framework that embeds the Edge WebView2 runtime, making it vulnerable to regressions in underlying browser engine updates.</p>



<p>Volunteer moderator Ruwim.B independently verified that the issue is also reproducible in the Teams Insider build (version 26093.408.4582.3829) when signed in with a personal/Teams Free account, confirming it is not related to organizational IT admin settings or policy configurations.</p>



<p>Notably, Teams for Web (teams.live.com) does not exhibit the issue, with all paste options functioning correctly in browser-based sessions.</p>



<p>Multiple enterprise users confirmed the bug affects pasting of all content types, not just URLs. Reported impacted scenarios include:</p>



<ul class="wp-block-list">
<li>Pasting images captured via Snipping Tool</li>



<li>Pasting text copied from external apps such as Outlook and Word</li>



<li>Pasting any content type after restarting or rebooting even on builds where paste initially appeared to work.</li>
</ul>



<p>A critical behavioral pattern emerged from user reports: if Teams version 26072.519.4556.7438 appears to be functioning correctly, closing and reopening Teams or rebooting the system will trigger the bug upon relaunch.</p>



<h2 class="wp-block-heading" id="microsofts-response-and-workarounds"><strong>Microsoft&#8217;s Response and Workarounds</strong></h2>



<p><a href="https://learn.microsoft.com/en-us/answers/questions/5858984/paste-feature-is-not-working-properly-in-teams-for" target="_blank" rel="noreferrer noopener">Microsoft acknowledged the incident</a> and confirmed a fix is being deployed through a staged rollout, with active telemetry monitoring underway to confirm recovery. While the fix propagates, Microsoft recommends the following temporary workarounds:</p>



<ul class="wp-block-list">
<li>Windows: Use <code>Ctrl+C</code> to copy and <code>Ctrl+V</code> to paste</li>



<li>Mac: Use <code>Cmd+C</code> and <code>Cmd+V</code> equivalents</li>



<li>Use <code>Ctrl+Shift+V</code> (Windows) or <code>Cmd+Shift+V</code> (Mac) to paste as plain text</li>



<li>Submit affected feedback via Teams Settings > Feedback > Report a Problem, or escalate through Microsoft 365 Admin Center > Service Health for organizational impact.</li>
</ul>



<p>Enterprise IT administrators managing affected fleets should advise end users to rely on keyboard shortcuts until the staged fix reaches their tenant version.</p>



<p>Organizations experiencing widespread impact are encouraged to file reports through the Microsoft 365 Admin Center to increase visibility with the Teams product engineering team.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/teams-right-click-paste-broken/">Microsoft Teams Right-Click Paste Broken Following Edge Browser Update</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Teams-Right-Click-Paste-Broken.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147858</post-id>	</item>
		<item>
		<title>OpenAI Expands Cyber Defense Program With GPT-5.4-Cyber Access for Trusted Organizations</title>
		<link>https://cybersecuritynews.com/gpt-5-4-cyber-defense-program/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Sun, 19 Apr 2026 06:35:21 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147792</guid>

					<description><![CDATA[<p>OpenAI has officially launched the expanded phase of its Trusted Access for Cyber program. Granting select organizations access to its specialized GPT-5.4-Cyber model to strengthen digital defenses across critical infrastructure, financial services, and open-source security communities. The program operates on a tiered trust model advanced AI cyber capabilities are made broadly available to defenders, but access scales based on [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/gpt-5-4-cyber-defense-program/">OpenAI Expands Cyber Defense Program With GPT-5.4-Cyber Access for Trusted Organizations</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>OpenAI has officially launched the expanded phase of its Trusted Access for Cyber program. Granting select organizations access to its specialized <a href="https://cybersecuritynews.com/gpt-5-4-launched/" target="_blank" rel="noreferrer noopener">GPT-5.4-Cyber model to strengthen digital defenses</a> across critical infrastructure, financial services, and open-source security communities.</p>



<p>The program operates on a tiered trust model advanced AI cyber capabilities are made broadly available to defenders, but access scales based on validation, accountability, and demonstrated safeguards.</p>



<p>OpenAI positions this as a direct response to the growing asymmetry between attackers <a href="https://cybersecuritynews.com/best-ai-tools-for-generating-ambient-music-for-meditation-and-relaxation/" target="_blank" rel="noreferrer noopener">leveraging AI tools and defenders who often lack equivalent resources.</a></p>



<h2 class="wp-block-heading" id="h-who-has-joined-the-program"><strong>Who Has Joined the Program</strong></h2>



<p>OpenAI confirmed that several major enterprises and cybersecurity firms have already signed on.</p>



<p>Including&nbsp;Bank of America, BlackRock, BNY, Citi, Cisco, Cloudflare, CrowdStrike, Goldman Sachs, iVerify, JPMorgan Chase, Morgan Stanley, NVIDIA, Oracle, Palo Alto Networks, SpecterOps, and Zscaler.</p>



<p>These organizations will use GPT-5.4-Cyber to enhance real-world defensive operations, <a href="https://cybersecuritynews.com/how-threat-intelligence-drives-a-real-roi-boost-for-your-soc/" target="_blank" rel="noreferrer noopener">generate threat intelligence,</a> and help OpenAI refine safety systems through practical deployment feedback.</p>



<p>OpenAI also granted access to  the&nbsp;U.S. Center for AI Standards and Innovation (CAISI) and the UK AI Security Institute for independent testing, reinforcing its commitment to third-party oversight.</p>



<p>Recognizing that most software teams lack 24/7 security operations coverage, OpenAI committed&nbsp;$10 million in API credits&nbsp;through its Cybersecurity Grant Program to extend access to its frontier models to under-resourced defenders.</p>



<p><strong>Initial grant recipients include:</strong></p>



<ul class="wp-block-list">
<li>Socket and Semgrep: focused on software supply chain security.</li>



<li>Calif and Trail of Bits:  pairing AI with expert vulnerability researchers.</li>
</ul>



<p>OpenAI emphasized the real-world problem this addresses; not every team can respond to a critical vulnerability disclosed on a Friday night.</p>



<p>The grant program aims to change that by giving smaller open-source maintainers and researchers the same AI capabilities available to large enterprises.</p>



<p>Additional teams with proven track records in open-source and critical <a href="https://openai.com/index/accelerating-cyber-defense-ecosystem/" target="_blank" rel="noreferrer noopener nofollow">infrastructure security can apply directly through OpenAI&#8217;s grant portal.</a></p>



<h2 class="wp-block-heading" id="h-the-defense-first-philosophy"><strong>The Defense-First Philosophy</strong></h2>



<p>OpenAI&#8217;s framing is clear: cyber defense is a collective challenge. The program is designed to generate shared learnings across participants, improve model safety through real-world use, and push the frontier of defensive research.</p>



<p>BNY&#8217;s Chief Information Officer, Leigh-Ann Russell, noted that the firm&#8217;s participation reflects its commitment to <a href="https://cybersecuritynews.com/how-to-secure-financial-data-in-tech-firms/" target="_blank" rel="noreferrer noopener">protecting financial system resilience as AI capabilities accelerate</a>, building on an existing collaboration with OpenAI.</p>



<p>The company confirmed that Trusted Access for Cyber will continue to expand, with safeguards that increase in step with model capability, ensuring that greater power comes with proportionally stronger accountability measures.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/gpt-5-4-cyber-defense-program/">OpenAI Expands Cyber Defense Program With GPT-5.4-Cyber Access for Trusted Organizations</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/OpenAI-Expands-Cyber-Defense-Program-With-GPT-5.4-Cyber-Access-for-Trusted-Organizations.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147792</post-id>	</item>
		<item>
		<title>Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character</title>
		<link>https://cybersecuritynews.com/apple-works-on-fix-for-iphone-passcode-bug/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 12:50:59 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147852</guid>

					<description><![CDATA[<p>Apple is reportedly developing a software fix for a frustrating iOS 26 bug that has left some users entirely locked out of their iPhones for months. According to a recent report by The Register, Cupertino’s software engineers are scrambling to patch a keyboard interface flaw that inadvertently removed a specific special character necessary for unlocking [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/apple-works-on-fix-for-iphone-passcode-bug/">Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Apple is reportedly developing a software fix for a frustrating iOS 26 bug that has left some users entirely locked out of their iPhones for months. </p>



<p>According to a recent report by The Register, Cupertino’s software engineers are scrambling to patch a keyboard interface flaw that inadvertently removed a specific special character necessary for <a href="https://cybersecuritynews.com/securing-iot-devices/" type="post" id="102072" target="_blank" rel="noreferrer noopener">unlocking devices </a>configured with custom alphanumeric passcodes.</p>



<p>The issue first gained public attention when a 21-year-old university student, Connor Byrne, shared his predicament on Reddit. </p>



<p>As The Register reported, Byrne opted not to use the standard four- or six-digit PIN on his iPhone 13. Instead, he enhanced his device security by setting a complex, custom alphanumeric string as his primary passcode.</p>



<p>While cybersecurity professionals highly recommend complex passcodes to<a href="https://cybersecuritynews.com/are-educational-institutions-easy-victims-of-ransomware-groups/" type="post" id="17807" target="_blank" rel="noreferrer noopener"> thwart brute-force attacks</a>, Byrne’s specific password combination triggered an unexpected software trap. </p>



<p>He utilized the caron or háček (ˇ) symbol from the iPhone&#8217;s Czech keyboard layout. When Apple released iOS 26 to the general public in September 2025, the company unknowingly removed this specific character from the<a href="https://cybersecuritynews.com/researchers-bypassed-android-lock-screen/" type="post" id="52680" target="_blank" rel="noreferrer noopener"> lock screen keyboard</a>.</p>



<p>Without the ability to type the required symbol, Byrne was permanently locked out of his smartphone. The only native solution provided by the device was a full factory reset. </p>



<p>However, a reset would permanently erase months of valuable photographs and personal files stored locally on the device. Choosing to preserve his data, the user has remained locked out while waiting for a potential software patch.</p>



<p>Following the viral social media post, Apple’s internal engineering team reportedly began investigating the issue. The Register notes that Apple is now working on a targeted fix to restore the missing character, which is expected to roll out in an upcoming major iOS 26 release.</p>



<p>Interestingly, despite Apple&#8217;s engineers responding within 9 days after the issue surfaced online, the extended lockout has permanently damaged the user&#8217;s trust. </p>



<p><a href="https://www.theregister.com/2026/04/17/iphone_keyboard_error_fix/" target="_blank" rel="noreferrer noopener nofollow">According to The Register,</a> Byrne has decided to migrate to an Android device, specifically eyeing the Samsung Galaxy S26 Ultra. </p>



<p>He cited both the software quality assurance oversight, noting that the current keyboard&#8217;s flaws duplicate characters side-by-side, and a preference for alternative camera hardware. Apple has not yet issued an official public comment on the fix&#8217;s timeline.</p>



<ul class="wp-block-list">
<li><strong>Backup Data Regularly:</strong> Always maintain up-to-date iCloud or physical backups. If a critical lock screen glitch occurs after an update, you can safely perform a factory reset without losing your data.</li>



<li><strong>Review Custom Passcodes:</strong> If you use a custom alphanumeric passcode, ensure it relies on standard characters that are universally available across different keyboard layouts to avoid getting locked out.</li>



<li><strong>Monitor Software Updates:</strong> Be cautious when adopting major operating system upgrades immediately upon release. As this incident highlights, unexpected interface bugs can temporarily sever device access.</li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/apple-works-on-fix-for-iphone-passcode-bug/">Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Apple-Works-on-Fix-for-iPhone-Passcode-Bug-Linked-to-Missing-Czech-Keyboard-Character-1-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147852</post-id>	</item>
		<item>
		<title>Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain</title>
		<link>https://cybersecuritynews.com/claude-opus-to-build-a-working-chrome-exploit-chain/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 12:16:39 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147846</guid>

					<description><![CDATA[<p>Amidst the heated debate surrounding Anthropic’s recent announcement of its Mythos and Project Glasswing models, a security researcher has demonstrated the tangible cybersecurity implications of frontier AI. Moving beyond theoretical warnings, the researcher successfully utilized Claude Opus to construct a fully functional exploit chain targeting Google Chrome&#8217;s complex V8 JavaScript engine. The experiment highlights a [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/claude-opus-to-build-a-working-chrome-exploit-chain/">Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Amidst the heated debate surrounding Anthropic’s recent announcement of its Mythos and Project Glasswing models, a security researcher has demonstrated the tangible cybersecurity implications of frontier AI. </p>



<p>Moving beyond theoretical warnings, the researcher successfully utilized <a href="https://cybersecuritynews.com/claude-opus-4-5-integrated-with-github-copilot/" type="post" id="137270" target="_blank" rel="noreferrer noopener">Claude Opus</a> to construct a fully functional exploit chain targeting Google Chrome&#8217;s complex V8 JavaScript engine.</p>



<p>The experiment highlights a persistent vulnerability in the modern software ecosystem: the patch gap. Many popular desktop applications built on the Electron framework, such as Discord, Notion, and Slack, bundle their own Chromium builds. </p>



<p>These bundled versions often lag weeks or months behind the upstream Chrome releases, leaving known vulnerabilities unpatched and exposing users to n-day exploits.</p>



<p>For this test, the researcher targeted the <a href="https://cybersecuritynews.com/malicious-npm-packages-target-discord-browsers-and-crypto-wallets/" type="post" id="144943" target="_blank" rel="noreferrer noopener">Discord desktop application</a>, which was running on the outdated Chrome 138 engine. </p>



<p>Because Discord operates without a sandbox on its main window, the exploit required only two vulnerabilities to achieve a full chain, circumventing the need for a third dedicated sandbox escape.</p>



<h2 class="wp-block-heading" id="h-chaining-the-vulnerabilities"><strong>Chaining the Vulnerabilities</strong></h2>



<p>Through a series of guided interactions, Claude Opus was tasked with developing an exploit using specific unpatched flaws. The AI successfully chained together two complex vulnerabilities to achieve<a href="https://cybersecuritynews.com/n8n-vulnerability/" type="post" id="146071" target="_blank" rel="noreferrer noopener"> Remote Code Execution (RCE)</a>:</p>



<ul class="wp-block-list">
<li><strong>CVE-2026-5873:</strong> An out-of-bounds (OOB) read and write vulnerability in V8&#8217;s Turboshaft compiler for WebAssembly. Fixed in Chrome 147, this bug allowed the attacker to bypass bounds checks after tier-up compilation, enabling arbitrary memory manipulation within the V8 heap.</li>



<li><strong>V8 Sandbox Bypass:</strong> A Use-After-Free (UAF) flaw in the WebAssembly Code Pointer Table (WasmCPT). By corrupting the import dispatch table and exploiting type confusion, the exploit escaped the V8 sandbox entirely, granting full read and write access to the entire virtual address space.</li>
</ul>



<p>Using these chained primitives, the model generated a payload capable of redirecting execution flows to the system&#8217;s dyld cache, ultimately launching arbitrary system commands on a macOS target.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="437" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1024x437.png" alt="Exploit Token (Source: Hacktron)" class="wp-image-147848" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1024x437.png 1024w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-300x128.png 300w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-768x328.png 768w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1536x656.png 1536w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-2048x874.png 2048w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-984x420.png 984w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-696x297.png 696w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1068x456.png 1068w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-1920x819.png 1920w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-48-150x64.png 150w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Exploit Token (Source: Hacktron)</figcaption></figure>



<p>Despite the impressive outcome, the process was far from fully autonomous. The researcher noted that Claude Opus required extensive human oversight, scaffolding, and operational management. </p>



<p>The AI frequently suffered from context collapse during long conversations, speculated on memory offsets instead of verifying them, and struggled to recover independently when stuck in logical loops.</p>



<p>Over the course of a week, the experiment consumed roughly 2.3 billion tokens across 1,765 requests, costing approximately $2,283 and requiring 20 hours of hands-on guidance. </p>



<p>The researcher had to continually feed the debugger (LLDB) back into the model to keep it on track,<a href="https://www.hacktron.ai/blog/i-let-claude-opus-to-write-me-a-chrome-exploit" target="_blank" rel="noreferrer noopener nofollow"> as reported by Hacktron AI</a>.</p>



<h2 class="wp-block-heading" id="h-economic-reality-and-future-threats"><strong>Economic Reality and Future Threats</strong></h2>



<p>While the process was labor-intensive, the economics of AI-assisted exploitation are striking. Spending around $2,300 and a few days of effort to generate a reliable Chrome exploit is highly profitable<a href="https://cybersecuritynews.com/ai-polluting-bug-bounty-platforms/" target="_blank" rel="noreferrer noopener"> when compared to commercial bug bounties</a>, which frequently pay upwards of $10,000 for similar submissions, or the highly lucrative underground exploit market.</p>



<p>This experiment serves as a stark warning for the cybersecurity industry. While current models like Claude Opus still require expert babysitting to weaponize vulnerabilities, the technological trajectory is clear. </p>



<p>As next-generation models like Anthropic&#8217;s Mythos emerge with enhanced reasoning and coding capabilities, the barrier to generating sophisticated exploits will drop drastically.</p>



<p> Ultimately, the shrinking gap between automated exploit generation and slow vendor patching cycles threatens to empower less sophisticated threat actors to compromise vulnerable software at an unprecedented scale.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/claude-opus-to-build-a-working-chrome-exploit-chain/">Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Researcher-Uses-Claude-Opus-to-Build-a-Working-Chrome-Exploit-Chain-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147846</post-id>	</item>
		<item>
		<title>Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</title>
		<link>https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 09:02:26 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147842</guid>

					<description><![CDATA[<p>Freelance service platform Fiverr is facing a significant privacy incident after researchers discovered that sensitive customer files are publicly accessible and indexed by Google search. According to a recent disclosure on Hacker News, an insecure file-hosting configuration has exposed personal identifiable information (PII), including completed tax forms, that were exchanged between freelancers and clients. The [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/">Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Freelance service platform Fiverr is facing a significant privacy incident after researchers discovered that sensitive customer files are publicly accessible and indexed by <a href="https://cybersecuritynews.com/hackers-hijacking-google-search-results-via-backdoored-browser-extensions/" type="post" id="4530" target="_blank" rel="noreferrer noopener">Google search</a>. </p>



<p>According to a recent disclosure on Hacker News, an insecure file-hosting configuration has exposed personal identifiable information (PII), including completed tax forms, that were exchanged between freelancers and clients.</p>



<h2 class="wp-block-heading" id="the-cloudinary-misconfiguration"><strong>The Cloudinary Misconfiguration</strong></h2>



<p>The root of the data exposure lies in how Fiverr handles file sharing within its internal messaging system. </p>



<p>The platform relies on a third-party service called Cloudinary to process and host images and PDF documents, including final work products delivered to clients.</p>



<p>While Cloudinary operates similarly to an <a href="https://cybersecuritynews.com/best-aws-monitoring-tools/" type="post" id="37530" target="_blank" rel="noreferrer noopener">Amazon S3 digital storage bucket</a> and supports secure, expiring web links, Fiverr reportedly configured the service incorrectly. </p>



<p>Instead of requiring authentication, Fiverr opted to generate fully public URLs for these sensitive attachments. Because these files were left open to the public, search engines like Google were able to crawl and index them. </p>



<p>This suggests that the public file links may have been exposed through unprotected HTML pages somewhere on Fiverr’s network.</p>



<p>The impact of this oversight is severe, as anyone can allegedly use specific Google search queries to surface private documents. </p>



<p>For example, running a site-specific search for &#8220;form 1040&#8221; on Fiverr&#8217;s Cloudinary domain instantly reveals<a href="https://cybersecuritynews.com/cybercriminals-abuse-irs-and-tax-filing-lures/" type="post" id="146216" target="_blank" rel="noreferrer noopener"> private tax documents </a>containing highly sensitive financial and personal data.</p>



<p>Interestingly, the researcher highlighted a troubling contradiction. Fiverr actively purchases Google Ads for tax preparation services, yet the platform fails to secure the resulting financial work products. </p>



<p>This exposure raises immediate regulatory concerns. By failing to lock down financial documents properly, the platform and its tax preparation freelancers could be in direct violation of the FTC Safeguards Rule and the Gramm-Leach-Bliley Act (GLBA), which mandate strict protections for consumer financial data.</p>



<p><a href="https://news.ycombinator.com/item?id=47769796" target="_blank" rel="noreferrer noopener nofollow">The researcher who discovered the issue claims</a> to have followed standard responsible disclosure protocols. A detailed vulnerability report was sent to Fiverr’s designated security team 40 days before the public release. </p>



<p>After receiving no response or remediation efforts from the company, the researcher opted to publish the findings on Hacker News to warn affected users.</p>



<h2 class="wp-block-heading" id="key-takeaways-and-mitigations"><strong>Key Takeaways and Mitigations</strong></h2>



<p>Until Fiverr resolves this public exposure, users are at risk of <a href="https://cybersecuritynews.com/christmas-phishing-surge-chains-docusign-spoofing/" type="post" id="138852" target="_blank" rel="noreferrer noopener">identity theft and financial fraud</a>. Both freelancers and clients should take immediate precautions:</p>



<ul class="wp-block-list">
<li><strong>Halt sensitive transfers:</strong> Users should temporarily stop sending sensitive documents, such as tax forms or medical records, through Fiverr&#8217;s messaging system.</li>



<li><strong>Implement signed URLs:</strong> Fiverr must urgently update its Cloudinary integration to utilize signed, time-limited URLs for all user-to-user file transfers to ensure files expire after being downloaded.</li>



<li><strong>Request search de-indexing:</strong> The company needs to issue urgent takedown requests to Google to remove the exposed domain directories from public search results.</li>



<li><strong>Monitor for identity theft:</strong> Clients who purchased financial or tax preparation gigs on Fiverr should monitor their credit reports for unauthorized activity.</li>
</ul>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/fiverr-allegedly-leaks-user-information-to-google/">Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Fiverr-Allegedly-Leaks-User-Information-to-Google-Indexing-Researchers-Say-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147842</post-id>	</item>
		<item>
		<title>Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</title>
		<link>https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 08:42:55 +0000</pubDate>
				<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147838</guid>

					<description><![CDATA[<p>A new iteration of the notorious Mirai botnet, dubbed Nexcorium, has emerged in the wild, aggressively targeting internet-connected video recording devices. According to recent threat research published by Fortinet&#8217;s FortiGuard Labs, threat actors are exploiting a known command injection vulnerability to hijack TBK DVR systems and construct a large-scale Distributed Denial-of-Service (DDoS) botnet. Fortinet researchers [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/">Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new iteration of the notorious Mirai botnet, dubbed Nexcorium, has emerged in the wild, aggressively targeting internet-connected video recording devices. </p>



<p>According to recent threat research published by Fortinet&#8217;s FortiGuard Labs, threat actors are exploiting a known <a href="https://cybersecuritynews.com/react-native-command-injection-flaw/" target="_blank" rel="noreferrer noopener">command injection vulnerability</a> to hijack TBK DVR systems and construct a large-scale Distributed Denial-of-Service (DDoS) botnet.</p>



<p>Fortinet researchers report that the campaign specifically targets TBK DVR-4104 and DVR-4216 models by exploiting CVE-2024-3721. This OS command injection flaw allows attackers to deliver a downloader script by manipulating arguments within the device system. </p>



<p>During the exploitation phase, network traffic reveals a custom HTTP header reading &#8220;X-Hacked-By: Nexus Team – Exploited By Erratic,&#8221; leading FortiGuard Labs to attribute the campaign to a relatively unknown threat actor identified as the &#8220;<a href="https://cybersecuritynews.com/china-nexus-hackers-attacking-telecommunication/" target="_blank" rel="noreferrer noopener">Nexus Team</a>&#8220;.</p>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-67.png" alt=" Exploit traffic via CVE-2024-3721 (Source: Fortinet)" class="wp-image-183817"/><figcaption class="wp-element-caption">&nbsp;Exploit traffic via CVE-2024-3721 (Source: Fortinet)</figcaption></figure>



<p>Once the downloader script executes, it fetches multi-architecture payloads supporting ARM, MIPS, and x86-64 environments, subsequently displaying a console message stating &#8220;nexuscorp has taken control&#8221;.</p>



<h2 class="wp-block-heading" id="technical-capabilities-and-infection-mechanisms"><strong>Technical Capabilities and Infection Mechanisms</strong></h2>



<p>Fortinet’s analysis reveals that Nexcorium shares <a href="https://cybersecuritynews.com/mirai-based-botnets-evolve-into-massive-ddos/" target="_blank" rel="noreferrer noopener">fundamental architecture with traditional Mirai variants</a>, utilizing XOR-encoded configurations and modular components. The technical operation relies on several core mechanisms:<a href="https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html" target="_blank" rel="noreferrer noopener"></a></p>



<ul class="wp-block-list">
<li><strong>Modular Architecture:</strong> The malware deploys standard Mirai features, including a watchdog module to distinguish sub-processes, a scanner for network propagation, and an attacker module for DDoS execution.</li>



<li><strong>Legacy Exploit Integration:</strong> To maximize its infection radius, Nexcorium incorporates the older CVE-2017-17215 vulnerability, which targets Huawei router devices.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Aggressive Brute-Forcing:</strong> The malware launches Telnet-based brute-force attacks against other networked hardware using a hardcoded list of common and default credentials.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li><strong>Self-Preservation:</strong> Nexcorium verifies its own integrity using FNV-1a hashing algorithms; if the binary is altered or unreadable, it dynamically duplicates itself under a new filename to evade detection.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-66.png" alt=" XOR-Encoded CVE-2017-17215 exploit (Source: Fortinet)" class="wp-image-183816"/><figcaption class="wp-element-caption">&nbsp;XOR-Encoded CVE-2017-17215 exploit (Source: Fortinet)</figcaption></figure>



<p>To maintain long-term access to compromised systems, the <a href="https://cybersecuritynews.com/ghostclaw-ai-assisted-malware/" target="_blank" rel="noreferrer noopener">malware establishes persistence</a> through four distinct mechanisms rather than relying on a single configuration file. The botnet secures its foothold by:<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></p>



<ul class="wp-block-list">
<li>Modifying <code>/etc/inittab</code> to ensure automatic process restarts if the malware is terminated.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Updating <code>/etc/rc.local</code> to guarantee execution during the device&#8217;s system startup sequence.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Creating a dedicated systemd service named <code>persist.service</code> for persistent background operation.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>



<li>Planting scheduled tasks via crontab for reliable post-reboot execution.<a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener"></a></li>
</ul>



<figure class="wp-block-image size-full"><img decoding="async" src="https://gbhackers.com/wp-content/uploads/2026/04/image-65.png" alt="Parsing the architecture information response from the victim host (Source: Fortinet)" class="wp-image-183815"/><figcaption class="wp-element-caption">Parsing the architecture information response from the victim host (Source: Fortinet)</figcaption></figure>



<p>Following this extensive setup, Fortinet notes that Nexcorium deletes its original binary from the execution path to thwart security analysts.</p>



<p>The primary objective of the Nexus Team campaign is launching devastating DDoS attacks. <a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign" target="_blank" rel="noreferrer noopener nofollow">Based on FortiGuard Labs&#8217; decryption of the malware&#8217;s configuration table</a>, Nexcorium communicates with a centralized command-and-control (C2) server to receive attack directives. </p>



<p>Instead of a narrow attack scope, the botnet is equipped with a versatile arsenal of flood techniques. These include standard UDP, TCP ACK, TCP SYN, SMTP, and TCP PSH floods, alongside specialized attack vectors like VSE query floods and UDP blast attacks.</p>



<p>The discovery of Nexcorium highlights the continuous weaponization of legacy IoT devices. Security experts strongly advise organizations to immediately patch CVE-2024-3721, replace default manufacturer credentials, and isolate critical infrastructure from vulnerable IoT endpoints using network segmentation.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit/">Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Nexcorium-Mirai-Variant-Weaponizes-TBK-DVR-Vulnerability-in-Fresh-IoT-Botnet-Push-1-2-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147838</post-id>	</item>
		<item>
		<title>Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</title>
		<link>https://cybersecuritynews.com/ftp-servers-exposed/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 02:43:34 +0000</pubDate>
				<category><![CDATA[Cyber Attack News]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147724</guid>

					<description><![CDATA[<p>According to a recent April 2026 report by security researcher Himaja Motheram at Censys, just under 6 million internet-facing hosts are still running the File Transfer Protocol (FTP). While this marks a significant 40% decline from the 10.1 million servers observed in 2024, the presence of this decades-old protocol continues to pose an exposure risk [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/ftp-servers-exposed/">Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>According to a recent April 2026 report by security researcher Himaja Motheram at Censys, just under 6 million <a href="https://cybersecuritynews.com/monsta-ftp-remote-code-vulnerability/" target="_blank" rel="noreferrer noopener">internet-facing hosts are still running the File Transfer Protocol (FTP).</a></p>



<p>While this marks a significant 40% decline from the 10.1 million servers observed in 2024, the presence of this decades-old protocol continues to pose an exposure risk due to widespread insecure default configurations.</p>



<p>The Censys report highlights that the dominant story of FTP exposure in 2026 is not purpose-built file transfer infrastructure, but rather an accumulation of platform defaults on shared hosting networks and broadband providers.</p>



<h2 class="wp-block-heading" id="h-the-state-of-encryption-and-regional-risks"><strong>The State of Encryption and Regional Risks</strong></h2>



<p>When it comes to securing these servers, the data reveals a mixed landscape. Censys found that roughly 58.9% of observed FTP hosts completed a <a href="https://cybersecuritynews.com/staying-on-top-of-tls-attacks/" target="_blank" rel="noreferrer noopener">Transport Layer Security (TLS) handshake</a>, meaning they support encrypted connections.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWc-bX8wtbk5jYfQ6cHUVgciSH4cHrtGVqK_BKuXTt2ioxECZ9sun64nr6JUsCYJ1106UQjEKLX460wfUXAYt9lgYvSTZBdASavVbcvypLenfXFwWM-BBDZG808wIvaZPBRj_L8ZYjVVZg31IywwcgPAPy0ybSq42TsX5HBTLGdGpROZnNgemqo273nZs/s1600/Screenshot%202026-04-17%20130236%20%281%29.webp" alt="FileZilla server responding with a funny TLS response(Source: Censys)" /><figcaption class="wp-element-caption"><em>FileZilla server responding with a funny TLS response(Source: Censys)</em></figcaption></figure>



<p>However, this leaves approximately 2.45 million hosts without observed evidence of encryption, potentially allowing them to transmit files and credentials in cleartext.</p>



<p>The lack of encryption adoption varies significantly by region. According to Censys data, mainland China and South Korea have the lowest TLS adoption rates among the top 10 hosting countries, at 17.9% and 14.5%, respectively.</p>



<p>Meanwhile, Japan accounts for 71% of all FTP servers globally that still rely on outdated, deprecated legacy <a href="https://cybersecuritynews.com/tor-adopts-galois-onion-encryption/" target="_blank" rel="noreferrer noopener">encryption protocols</a> such as TLS 1.0 and 1.1.</p>



<p>The security posture of these 6 million servers is heavily influenced by the default settings of the software daemons running them.</p>



<p><strong>Key technical observations from the Censys report include:</strong></p>



<ul class="wp-block-list">
<li><strong>Pure-FTPd Dominance:</strong> Operating on roughly 1.99 million services, this is the most common FTP daemon, largely driven by its inclusion as a default in cPanel hosting environments.<br></li>



<li><strong>The IIS FTP Configuration Trap:</strong> Over 150,000 <a href="https://cybersecuritynews.com/badiis-malware-compromising-iis-servers/" target="_blank" rel="noreferrer noopener">Microsoft IIS FTP services</a> return a &#8220;534&#8221; error response, indicating TLS was never configured.<br><br>While IIS defaults to a policy that appears to require encryption, it does not bind a security certificate upon a fresh installation. <br><br>Consequently, <a href="https://cybersecuritynews.com/lynx-gateway-vulnerability/" target="_blank" rel="noreferrer noopener">the server accepts cleartext credentials</a>, even though the configuration appears to enforce TLS.<br></li>



<li><strong>Hidden Nonstandard Ports:</strong> Relying only on port 21 scans miss a significant portion of the attack surface. <br><br>Tens of thousands of FTP services run on alternate ports, such as 10397 or 2121, often tied to specific telecom operations or network-attached storage devices.</li>
</ul>



<h2 class="wp-block-heading" id="h-mitigation-and-hardening-strategies"><strong>Mitigation and Hardening Strategies</strong></h2>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsr3i2hlehPh3kVg8ltuT0bqF9Iq8kviM-3PcIlaycBjnO6gSRkdyPna1Oqu5AUG16DVkY80p5048Ruu-O59bkY9M268RCpGBKkTACaYnwI2CDU1L8-x36X93_nh-37Vv-sh6W1DB94fBiB3lNwMOcVi5a0SoMKtB1Xuv8jA37aMXt0vYPwmZD_SUowYA/s1600/Screenshot%202026-04-17%20130214%20%281%29.webp" alt="2.35 Million FTP Services With No Evidence of TLS(Source: Censys)" /><figcaption class="wp-element-caption"><em>2.35 Million FTP Services With No Evidence of TLS(Source: Censys)</em></figcaption></figure>



<p>For enterprise defenders and infrastructure administrators, <a href="https://censys.com/blog/ftp-exposure-brief/" target="_blank" rel="noreferrer noopener nofollow">Censys strongly recommends evaluating</a> whether FTP is truly necessary before attempting to harden it.</p>



<p><strong>Organizations should consider the following mitigation strategies:</strong></p>



<ul class="wp-block-list">
<li><strong>Migrate to Secure Alternatives:</strong> Whenever possible, <a href="https://cybersecuritynews.com/titan-file-transfer-server-flaws/" target="_blank" rel="noreferrer noopener">replace FTP with SSH File Transfer Protocol (SFTP)</a>, which encrypts credentials and data by default over port 22.<br></li>



<li><strong>Enforce Explicit TLS:</strong> If legacy FTP infrastructure must remain online, administrators should configure their daemons to enforce Explicit TLS (FTPS) and refuse cleartext connections.<br></li>



<li><strong>Fix IIS Certificate Bindings:</strong> Windows Server administrators using IIS FTP must ensure that a valid certificate is bound to the FTP site and verify that the SSL policy actively enforces encryption.</li>
</ul>



<p>Ultimately, while the internet&#8217;s reliance on FTP is slowly shrinking, millions of instances continue to run quietly in the background.</p>



<p>As Censys warns, the primary risk is not advanced <a href="https://cybersecuritynews.com/hackers-launch-zero-day-attacks-to-exploits-corrupted-files-to-evade-security-tools/" target="_blank" rel="noreferrer noopener">zero-day attacks</a>, but the simple failure to update default configurations that leave systems unnecessarily exposed.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/ftp-servers-exposed/">Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Nearly-6-Million-Internet-Facing-FTP-Servers-Still-Exposed-in-2026-Censys-Warns.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147724</post-id>	</item>
		<item>
		<title>PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</title>
		<link>https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 02:38:56 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Vulnerability News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147763</guid>

					<description><![CDATA[<p>A proof-of-concept (PoC) exploit has been publicly released for a critical vulnerability in Fortinet&#8217;s FortiSandbox product, tracked as&#160;CVE-2026-39808. The flaw allows an unauthenticated attacker to execute arbitrary operating system commands as root, the highest privilege level, without requiring any login credentials. The vulnerability was originally discovered in&#160;November 2025&#160;and has now been made public following Fortinet&#8217;s [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/">PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A proof-of-concept (PoC) exploit has been publicly released for a critical vulnerability in Fortinet&#8217;s FortiSandbox product, tracked as&nbsp;CVE-2026-39808.</p>



<p>The flaw allows an unauthenticated attacker to <a href="https://cybersecuritynews.com/cups-vulnerability-remote-attack/" target="_blank" rel="noreferrer noopener">execute arbitrary operating system commands as root,</a> the highest privilege level, without requiring any login credentials.</p>



<p>The vulnerability was originally discovered in&nbsp;November 2025&nbsp;and has now been made public following Fortinet&#8217;s patch release in&nbsp;April 2026.</p>



<p>Security researchers and defenders are urged to apply the fix immediately, as a working exploit is now freely available on GitHub.</p>



<p>CVE-2026-39808 is an <a href="https://cybersecuritynews.com/fortisandbox-os-command-injection-vulnerability/" target="_blank" rel="noreferrer noopener">OS command injection vulnerability</a> affecting Fortinet&#8217;s FortiSandbox, a widely used sandboxing solution designed to detect and analyze advanced threats and malware. The flaw resides in the <code>/fortisandbox/job-detail/tracer-behavior</code> endpoint.</p>



<h2 class="wp-block-heading" id="h-how-simple-is-the-attack"><strong>How Simple Is the Attack?</strong></h2>



<p>An attacker can inject malicious operating system commands through the<code> jid</code> GET parameter by using the <code>pipe symbol (|)</code> a common technique used to <a href="https://cybersecuritynews.com/apache-vulnerability-to-steal-sensitive-data-from-unix/" target="_blank" rel="noreferrer noopener">chain commands in Unix-based systems</a>.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQQTmxjOXVqIpFxBamiAUZOxPt3tAPqA5jsAdn0VpRfWOkLvCbuSiCjP7a7zQew4_7CzRrin7JIoTCdAh-9gzLZHsL3wARCAdgdW8mXlupfavPqSMgZS9z13lgd6PNGLBzd2slGGnp-Rci5Hbe7H5OtXW8pulB-EeJy6M39OxwJnB4Py7cQ9kundEYLek/s1600/Screenshot%202026-04-17%20164341%20%281%29.webp" alt="OS command injection via | in the jid parameter(source : GitHub)" /><figcaption class="wp-element-caption"><br>OS command injection via <code>|</code> in the jid parameter(source : GitHub)</figcaption></figure>



<p>Because the vulnerable endpoint fails to properly sanitize user input, the injected commands are executed directly by the underlying operating system with root-level privileges.</p>



<p>FortiSandbox versions&nbsp;4.4.0 through 4.4.8&nbsp;are confirmed to be affected by this vulnerability.</p>



<p>What makes CVE-2026-39808 especially alarming is how easy it is to exploit.</p>



<p><a href="https://github.com/samu-delucas/CVE-2026-39808?tab=readme-ov-file" id="https://github.com/samu-delucas/CVE-2026-39808?tab=readme-ov-file" target="_blank" rel="noreferrer noopener nofollow">According to researcher samu-delucas, who published the PoC on GitHub</a>, a single curl command is enough to achieve unauthenticated remote code execution (RCE) as root:</p>



<p><code>curl -s -k --get "http://$HOST/fortisandbox/job-detail/tracer-behavior" --data-urlencode "jid=|(id &gt; /web/ng/out.txt)|"</code></p>



<p>In this example, the attacker redirects command output to a file stored in the web root, which can then be retrieved through a browser.</p>



<p>This means an attacker could <a href="https://cybersecuritynews.com/scarcruft-abuses-legitimate-cloud-services/" target="_blank" rel="noreferrer noopener">read sensitive files, drop malware, or fully compromise the host system </a>all without ever logging in.</p>



<h2 class="wp-block-heading" id="h-fortinet-s-response"><strong>Fortinet&#8217;s Response</strong></h2>



<p><a href="https://cybersecuritynews.com/fortinet-security-update-march/" target="_blank" rel="noreferrer noopener">Fortinet patched the vulnerability </a>and published its official advisory under FG-IR-26-100 through its FortiGuard PSIRT portal.</p>



<p>The advisory confirms the severity of the flaw and outlines affected versions. Organizations running FortiSandbox 4.4.0 through 4.4.8 should upgrade to a patched version without delay.</p>



<ul class="wp-block-list">
<li><strong>Patch immediately: </strong> upgrade FortiSandbox to a version beyond 4.4.8 as specified in Fortinet&#8217;s official advisory.<br></li>



<li><strong>Audit exposed instances:</strong> check whether FortiSandbox management interfaces are exposed to untrusted networks or the public internet.<br></li>



<li><strong>Review logs:</strong>  look for unusual GET requests to the <code>/fortisandbox/job-detail/tracer-behavior</code> endpoint as indicators of exploitation attempts.<br></li>



<li><strong>Apply network segmentation:</strong> restrict access to FortiSandbox administrative interfaces to trusted IP ranges only.</li>
</ul>



<p>With a working PoC now publicly available, the window for exploitation is open. Security teams should treat this as a critical-priority patch and act immediately to secure affected systems.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/poc-exploit-fortisandbox-vulnerability/">PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/PoC-Exploit-Released-for-FortiSandbox-Vulnerability-that-Allows-attacker-to-execute-commands.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147763</post-id>	</item>
		<item>
		<title>Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</title>
		<link>https://cybersecuritynews.com/hackers-target-tp-link-routers/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 17:53:50 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147825</guid>

					<description><![CDATA[<p>A known security flaw in several end-of-life TP-Link Wi-Fi routers is being actively targeted by hackers trying to install Mirai-based botnet malware on vulnerable devices. The vulnerability, tracked as CVE-2023-33538, affects multiple TP-Link models that no longer receive vendor updates, leaving users with no official patch to apply. The affected routers include the TL-WR940N (versions [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/hackers-target-tp-link-routers/">Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A known security flaw in several end-of-life TP-Link Wi-Fi routers is being actively targeted by hackers trying to install Mirai-based botnet malware on vulnerable devices. </p>



<p>The vulnerability, tracked as CVE-2023-33538, affects multiple TP-Link models that no longer receive vendor updates, leaving users with no official patch to apply.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The affected routers include the TL-WR940N (versions 2 and 4), TL-WR740N (versions 1 and 2), and TL-WR841N (versions 8 and 10). </p>



<p>These devices share a common weakness in their web management interfaces, where a specific parameter inside an HTTP GET request is not properly checked for harmful content. </p>



<p>This missing input validation gives attackers a clear opening to inject and run commands on the router without triggering any warning on the device.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attacks work by sending malicious HTTP GET requests to the /userRpm/WlanNetworkRpm endpoint. The requests carry commands embedded in the ssid parameter, which the router&#8217;s firmware processes without filtering harmful input. </p>



<p>Once the router accepts the request, the commands instruct it to download an ELF binary named arm7 from a remote server at IP address 51.38.137[.]113, assign it full execution permissions, and run it immediately.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/" id="https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/" target="_blank" rel="noreferrer noopener nofollow">Unit 42 analysts and researchers at Palo Alto Networks identified this malicious activity</a> after CISA added CVE-2023-33538 to its Known Exploited Vulnerabilities (KEV) catalog in June 2025. </p>



<p>Their telemetry systems detected large-scale, automated exploitation attempts around that same period, with multiple probes targeting the same vulnerable endpoint across numerous devices in the wild.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>The downloaded arm7 binary is a variant of the Condi IoT botnet malware, a Mirai-based family tied to previous campaigns. Once running on the infected router, the malware connects to a command-and-control (C2) server and folds the device into a larger botnet. </p>



<p>The C2 domain cnc.vietdediserver[.]shop is directly associated with these <a href="https://cybersecuritynews.com/zyxel-nas-devices-under-attack/" id="68510" target="_blank" rel="noreferrer noopener">Mirai-like botnet</a> operations and was confirmed malicious.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="inside-the-arm7-malware-binary"><strong>Inside the Arm7 Malware Binary</strong></h2>



<p>After gaining access to the device, the arm7 binary carries out a structured set of tasks to maintain its presence and grow the botnet. </p>



<p>It waits for specific byte-pattern commands from the C2 server and responds by sending heartbeat signals, triggering self-updates, and launching internal HTTP server functions.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqm-hGRYR0uwfWcfpGcGJpV3LMHHahbzmIwE1GEBklSVj2hyphenhyphenCFHiguEgcGkD8hCXUh2oqzTzAkg-IIs7SVxlwFEltMrzuJHns9y9wKDsBRhE0pxpxKzeGoaFaPyHc2zTvTGr72Tc8MkHMLGqPLZ73D6tFqYliLwjGRDZTf-mq5y4_ZO1uk7UNbZ4bVztU/s16000/An%20example%20of%20an%20exploit%20attempt%20for%20CVE-2023-33538%20that%20we%20observed%20in%20May%202025%20(Source%20-%20Unit42).webp" alt="An example of an exploit attempt for CVE-2023-33538 that we observed in May 2025 (Source - Unit42)" /><figcaption class="wp-element-caption">An example of an exploit attempt for CVE-2023-33538 that we observed in May 2025 (Source &#8211; Unit42)</figcaption></figure>



<p>One particularly notable behavior is the self-update routine. The binary uses the update_bins() function to connect back to 51.38.137[.]113 on TCP port 80 and pull fresh copies of itself built for eight different CPU architectures, including arm6, mips, sh4, and x86_64. </p>



<p>The <a href="https://cybersecuritynews.com/whats-the-difference-between-a-mac-address-and-an-ip-address/" id="84137" target="_blank" rel="noreferrer noopener">IP address</a> and port are hard-coded directly inside the binary, as confirmed during disassembly. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTx-g8FU5sEtrVSXTRozBPgl13PBKgph_4vbq74-0DctXgAvxiOiL9gDZVEXz_NPOeAIgWkjrDzPYV3VLlGP9WH8zCSC2jpsvdx5N8DYBnSmvF8MQ1oZcDB5zD6oDWOVu-fsWnTVbP8B642BeYdFGfb229ePPBqSOR0tRSWZBWJfv4nx3maZ1Hzmel9bY/s16000/The%20update_bins%20function%20with%20a%20hard-coded%20IP%20address%20and%20port%20(Source%20-%20Unit42).webp" alt="The update_bins function with a hard-coded IP address and port (Source - Unit42)" /><figcaption class="wp-element-caption">The update_bins function with a hard-coded IP address and port (Source &#8211; Unit42)</figcaption></figure>
</div>


<p>The arm7 binary also starts an HTTP server on the infected device using a port randomly chosen between 1024 and 65535. </p>



<p>Once active, this server delivers fresh malware copies to other devices that connect to it, spreading the infection further without requiring any additional input from the attacker. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0w6Ws0chvpvrSTWbD-oP0hPG1JtuhkGrvKbYx3snpKYi0HvP8X49bX0c4220cNDFrg3FN3bL57V9ZuUic-7MdaOyp7puUKus_hhRQ4NzzHnDE-dgIcFiWnk8cDllcPvhHhB5rLS6VKjazY02S1BV8rcQLUQ6_HhL1U6wBFhOgVUug1G0Ma1WZCAmFkeQ/s16000/httpd_start()%20function%20graph%20for%20the%20arm7%20binary%20(Source%20-%20Unit42).webp" alt="httpd_start() function graph for the arm7 binary (Source - Unit42)" /><figcaption class="wp-element-caption">httpd_start() function graph for the arm7 binary (Source &#8211; Unit42)</figcaption></figure>
</div>


<p>This allows each newly infected host to go on recruiting more victims. Despite their scale, the in-the-wild exploit attempts observed by researchers carried technical errors. </p>



<p>The attackers targeted the ssid parameter rather than the correct and vulnerable ssid1 parameter, and their injected commands depended on wget, a utility absent from the router&#8217;s limited BusyBox environment. </p>



<p>Even so, the research team confirmed that the underlying vulnerability is real and that a more accurate attacker using the correct parameter could successfully exploit it.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/94360e9d-f3d0-4b03-b702-a6a5bc174693/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.pdf?AWSAccessKeyId=ASIA2F3EMEYES5DP5HUF&amp;Signature=dqGMt32Dzapv4JKBte5sd9RU5jo%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEBEaCXVzLWVhc3QtMSJGMEQCIGj6%2BGsngw0j%2Fb9f7nJd7V2DccNT5X2atFwTjz0kOvszAiBwxcoNqRxWA0pIjJAzH4Z%2FpyAiVl7pUojStKIKYohEIir8BAjZ%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAEaDDY5OTc1MzMwOTcwNSIMoPH3JU77NnlxubyLKtAEfrPK6GRIktC45JC6Wps8YVPEUfTnVy4GYMQOMxHcMWw9RRftKF6A9ydzTLjZ2gOiOxpK%2FzEcj1OiMeGEHejDmYeYdnxi9aayqGnxpjqutHarAyz6iHoY9t%2Bq86xF2c7nvgjuJt38ChOPEXqXPC9xt9jiWS%2FhJ5WfCmpxv6VvGlLWJTuMOCp8EGYxxEm0yoK1s9K6M%2BWQCOr%2FdhDdeBDKDFgquaxq%2FT0h2eAXk4G071GGxlo6Ed2pLbO047AIyR0h54UoUCuy%2BDAlwSD35hSOL4Zc5gdzXO%2FVK55i%2BgfsJWew6rXQQuPLVrEccIRTRAK5Ei1spQj48DF0DHo1wx4O1EQN3h5T8VmIgYDyPXNVyx8to%2FDdRNNgbqf4Vp2H6qZQ5BbkIW5KuT%2FAOGaz2xXTsLyKkkdJZmPCh8xGbawtVNhr52QEpUddqsYvlSSma%2BSpgtVnaLkIij9xP22XI%2F2D%2BL%2BYG2C1raOzwUgyw5oSwcGXoA2znvzZzPkDwSKwdYWeu2WEXZv%2BvbiMkXCeCm6lwAWZuXfjisAHDJh7Oe4YWfkvduac8QSRmx2AK1sUOtfWV0sS3Je6cIp1DFmoYHaLy6dWfTKiNDnYSulzfh89L%2B%2Fax9WZfRAoDws6tnzy1Lt1iHgyrqxc3Dwjz92KmLvDBsXrTwRID7UnaKlzBzDZ0LHOD2F8h0%2FDnyflWtzaf28vPDsdy79GnbvssZJLFPbcRAH9%2FZbwnkvLNnRo5pRtY%2FkE%2BHPzBTKing%2FPvB4LNff0CdWqk8kKAjBadz5ZrB9KXTDwu4nPBjqZAfz3bfX5Vez5ZeXp7uLjJPMnvigjT6WDtrAe4j1VvqvCQfYxnqVx2fB2uc5oCf1edxnIykdHppqx2gM9KQsUVw3UWe5H5y5oEQxWTp8g5Fvhs1uWEKzQtQZc8hkhdO7MOyWrPgqyeEO0FS5c0bTUrUZC4t5A6OHQ3CPVfBVIDyV4tTOc2uWvJRP%2BDx4lhbik6NaaHocqdhFz9A%3D%3D&amp;Expires=1776443586" target="_blank" rel="noreferrer noopener"></a></p>



<p>Regarding recommendations, TP-Link confirmed the affected devices are end-of-life and no vendor patches will be made available. The company advises users to replace these units with currently supported hardware. </p>



<p>Changing the default admin:admin login credentials is also strongly recommended, as exploitation of this vulnerability requires authenticated access to the router&#8217;s web interface. </p>



<p>Administrators should monitor <a href="https://cybersecuritynews.com/attaxion-releases-agentless-traffic-monitoring-for-immediate-risk-prioritization/" id="123027" target="_blank" rel="noreferrer noopener">outbound traffic</a> for connections to known malicious domains and retire any affected TP-Link router models still active on their networks.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 90%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/hackers-target-tp-link-routers/">Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147825</post-id>	</item>
	</channel>
</rss>
