<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security News</title>
	<atom:link href="https://cybersecuritynews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cybersecuritynews.com/</link>
	<description>World&#039;s #1 Premier Cybersecurity and Hacking News Portal</description>
	<lastBuildDate>Sat, 11 Apr 2026 08:56:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cybersecuritynews.com/wp-content/uploads/2025/12/cropped-CSN-Favico-32x32.webp</url>
	<title>Cyber Security News</title>
	<link>https://cybersecuritynews.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">192061645</site>	<item>
		<title>Google Launches Gmail End-to-End Encryption for Android and iOS</title>
		<link>https://cybersecuritynews.com/gmail-end-to-end-encryption-for-android-and-ios/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 08:56:34 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147181</guid>

					<description><![CDATA[<p>Google has officially rolled out End-to-End Encryption (E2EE) for the Gmail application on Android and iOS devices. This major update targets users utilizing Gmail client-side encryption. It allows organisations to handle sensitive data confidentially directly from their smartphones or tablets. The feature ensures compliance with strict data sovereignty rules while keeping the workflow entirely mobile. [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/gmail-end-to-end-encryption-for-android-and-ios/">Google Launches Gmail End-to-End Encryption for Android and iOS</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google has officially rolled out <a href="https://cybersecuritynews.com/end-to-end-encryption/" type="post" id="84669" target="_blank" rel="noreferrer noopener">End-to-End Encryption </a>(E2EE) for the Gmail application on Android and iOS devices. This major update targets users utilizing Gmail client-side encryption. </p>



<p>It allows organisations to handle sensitive data confidentially directly from their smartphones or tablets. The feature ensures compliance with strict data sovereignty rules while keeping the workflow entirely mobile.</p>



<p>Users can now compose and read encrypted messages natively within the<a href="https://cybersecuritynews.com/google-bring-end-to-end-encryption-for-gmail/" type="post" id="98070" target="_blank" rel="noreferrer noopener"> standard Gmail application</a>. There is no longer a requirement to download third-party applications or log into separate secure email portals. </p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="296" height="640" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-13.png" alt="Composing a E2EE message in Gmail (Source: Google)" class="wp-image-147183" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-13.png 296w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-13-139x300.png 139w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-13-194x420.png 194w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-13-150x324.png 150w" sizes="(max-width: 296px) 100vw, 296px" /><figcaption class="wp-element-caption"><em>Composing a E2EE message in Gmail</em> (Source: Google)</figcaption></figure>
</div>


<p>Client-side encryption means the data is scrambled before it ever reaches Google&#8217;s servers. </p>



<p>Google holds no keys to decrypt this information, preventing the company from reading your messages under any circumstances. Employees equipped with a proper license can seamlessly send these encrypted communications to anyone.</p>



<h2 class="wp-block-heading" id="seamless-cross-platform-delivery"><strong>Seamless Cross-Platform Delivery</strong></h2>



<p><a href="https://workspaceupdates.googleblog.com/2026/04/gmail-end-to-end-encryption-now-available-on-mobile-devices.html" target="_blank" rel="noreferrer noopener nofollow">Google designed the delivery mechanism</a> to be entirely frictionless for the person receiving the email. If the recipient uses the standard Gmail app, the encrypted message arrives and functions just like a typical email thread. </p>



<p>This creates a highly user-friendly experience that requires no technical knowledge from the receiver. The system also supports external communication, as outgoing encrypted messages are not restricted to Gmail users.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="296" height="640" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-14.png" alt="Recipient without Gmail app reading in browser (Source: Google)" class="wp-image-147184" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-14.png 296w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-14-139x300.png 139w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-14-194x420.png 194w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-14-150x324.png 150w" sizes="(max-width: 296px) 100vw, 296px" /><figcaption class="wp-element-caption"><em>Recipient without Gmail app reading in browser</em> (Source: Google)</figcaption></figure>
</div>


<p>Guest recipients using alternative email services have a straightforward path to access the data. When a non-Gmail user receives the email, they can securely open, read, and reply using their default web browser. </p>



<p>This process authenticates their identity securely without requiring them to create a new account. Once verified, they can view the confidential text and download any encrypted attachments safely. </p>



<p>This eliminates the usual friction associated with sending <a href="https://cybersecuritynews.com/beware-of-weaponized-research-papers-that-delivers-malware/" type="post" id="111288" target="_blank" rel="noreferrer noopener">protected documents </a>to external vendors.</p>



<p>System administrators must take specific actions before employees can utilize these new mobile features. Admins need to log into the <a href="https://cybersecuritynews.com/microsoft-family-safety-blocks-chrome/" type="post" id="112047" target="_blank" rel="noreferrer noopener">Workspace Admin Console </a>and explicitly enable the mobile clients within the encryption interface. </p>



<p>Administrators maintain complete authority over the cryptographic keys and the identity providers used to authenticate users. </p>



<p>Once this backend configuration is complete, the process becomes effortless for end users. To secure a message, a user simply taps the lock icon while drafting an email and selects the additional encryption option.</p>



<h2 class="wp-block-heading" id="rollout-and-availability-details"><strong>Rollout and Availability Details</strong></h2>



<figure class="wp-block-table is-style-stripes"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Requirement Type</th><th class="has-text-align-left" data-align="left">Specific Details</th></tr></thead><tbody><tr><td>Current Status</td><td>Available now.</td></tr><tr><td>Release Tracks</td><td>Rapid Release and Scheduled Release domains.</td></tr><tr><td>Required Tier</td><td>Enterprise Plus.</td></tr><tr><td>Required Add-on</td><td>Assured Controls or Assured Controls Plus.</td></tr><tr><td>Supported Platforms</td><td>Android and iOS Gmail applications.</td></tr></tbody></table></figure>



<p>This security update is currently live for eligible organizational accounts requiring the highest levels of data protection. The table below outlines the specific workspace requirements needed to access mobile end-to-end encryption.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/gmail-end-to-end-encryption-for-android-and-ios/">Google Launches Gmail End-to-End Encryption for Android and iOS</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Google-Launches-Gmail-End-to-End-Encryption-for-Android-and-iOS-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147181</post-id>	</item>
		<item>
		<title>Google Unveils Device-Bound Chrome Sessions in Anti-Cookie-Theft Move</title>
		<link>https://cybersecuritynews.com/device-bound-chrome-sessions-in-anti-cookie-theft-move/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 06:52:58 +0000</pubDate>
				<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147175</guid>

					<description><![CDATA[<p>Google officially announced the public rollout of Device Bound Session Credentials (DBSC) for Windows users on Chrome 146. According to the Google Account Security and Chrome teams, this major security update aims to eliminate session hijacking, a primary method for attackers to compromise user accounts. The feature will also expand to macOS in an upcoming [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/device-bound-chrome-sessions-in-anti-cookie-theft-move/">Google Unveils Device-Bound Chrome Sessions in Anti-Cookie-Theft Move</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google officially announced the public rollout of <a href="https://cybersecuritynews.com/diesel-vortex-targets-global-logistics-sector/" type="post" id="143536">Device Bound Session </a><a href="https://cybersecuritynews.com/diesel-vortex-targets-global-logistics-sector/" type="post" id="143536" target="_blank" rel="noreferrer noopener">C</a><a href="https://cybersecuritynews.com/diesel-vortex-targets-global-logistics-sector/" type="post" id="143536">redentials </a>(DBSC) for Windows users on Chrome 146. </p>



<p>According to the Google Account Security and Chrome teams, this major security update aims to eliminate session hijacking, a primary method for attackers to compromise user accounts.</p>



<p>The feature will also expand to macOS in an upcoming release, marking a critical industry shift from reactive threat detection to proactive prevention.</p>



<h2 class="wp-block-heading" id="h-the-threat-of-cookie-exfiltration"><strong>The Threat of Cookie Exfiltration</strong></h2>



<p>Session theft typically happens when a user accidentally downloads infostealing malware, <a href="https://cybersecuritynews.com/lummac2-stealer-custom-control-flow-execution/" target="_blank" rel="noreferrer noopener">such as the LummaC2 family</a>. Once inside a system, the malware hunts for existing session cookies stored in the browser&#8217;s local files.</p>



<p>Because authentication cookies often stay valid for long periods, threat actors can steal them to bypass passwords entirely. Historically, stopping malware from reading browser memory using only software was nearly impossible, forcing security teams to rely on complex detection methods after a breach had already occurred.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="622" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12-1024x622.png" alt="An overview of the DBSC protocol showing the interaction between the browser and server (Source: Blogger)" class="wp-image-147177" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12-1024x622.png 1024w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12-300x182.png 300w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12-768x466.png 768w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12-692x420.png 692w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12-696x422.png 696w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12-1068x648.png 1068w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12-150x91.png 150w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-12.png 1364w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>An overview of the DBSC protocol showing the interaction between the browser and server</em> (Source: Blogger)</figcaption></figure>



<p>DBSC fundamentally changes web security by tying an authentication session to a user&#8217;s physical device. The protocol relies on hardware-backed security modules, like the <a href="https://cybersecuritynews.com/google-authenticators-hidden-passkey-architecture/" type="post" id="145739" target="_blank" rel="noreferrer noopener">Trusted Platform Module (TPM)</a> on Windows or the Secure Enclave on Apple devices.</p>



<p>When a user logs in, the hardware generates a unique public-private key pair. Crucially, the private key can never be exported from the machine. Websites that upgrade their backends to support DBSC issue short-lived cookies, and Chrome must constantly prove it holds the private key to refresh them.</p>



<p>If a hacker steals the session cookies, the credentials quickly expire and become useless because the attacker lacks the victim&#8217;s physical hardware key. <a href="https://cybersecuritynews.com/how-to-hire-web-developers-a-complete-guide/" type="post" id="124665" target="_blank" rel="noreferrer noopener">Web developers</a> can implement this seamlessly, as the browser handles the complex cryptography in the background.</p>



<p>Despite its strict device-binding capabilities, DBSC was built with rigorous privacy controls. The protocol uses a completely separate key for every session.</p>



<p>This ensures websites cannot use the technology to track users across different sites or correlate browsing activities. Furthermore, it only shares the minimum data required to prove possession, preventing the tool from being abused for device fingerprinting.</p>



<p><a href="https://security.googleblog.com/2026/04/protecting-cookies-with-device-bound.html" target="_blank" rel="noreferrer noopener nofollow">Google developed DBSC as an open web standard </a>alongside the W3C Web Application Security Working Group, partnering closely with Microsoft and conducting trials on platforms such as Okta. Looking ahead, Google plans to expand DBSC capabilities to secure federated identity and Single Sign-On (SSO) environments for enterprises.</p>



<p>The team is also developing advanced registration options to bind sessions to existing hardware security keys, and exploring software-based key support to protect devices that lack physical security hardware.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/device-bound-chrome-sessions-in-anti-cookie-theft-move/">Google Unveils Device-Bound Chrome Sessions in Anti-Cookie-Theft Move</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Google-Unveils-Device-Bound-Chrome-Sessions-in-Anti-Cookie-Theft-Move-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147175</post-id>	</item>
		<item>
		<title>Ransomware Gangs Expand Use of EDR Killers Beyond Vulnerable Drivers, ESET Warns</title>
		<link>https://cybersecuritynews.com/ransomware-gangs-expand-use-of-edr-killers/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 05:13:11 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147168</guid>

					<description><![CDATA[<p>In recent years, Endpoint Detection and Response (EDR) killers have become a standard, highly effective weapon in modern ransomware intrusions. Before launching their file-encrypting malware, cybercriminals routinely deploy specialized tools to bypass security software. According to a comprehensive new report by ESET Research, the threat landscape has grown far beyond the well-known Bring Your Own [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/ransomware-gangs-expand-use-of-edr-killers/">Ransomware Gangs Expand Use of EDR Killers Beyond Vulnerable Drivers, ESET Warns</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In recent years, Endpoint Detection and Response (EDR) killers have become a standard, highly effective weapon in modern ransomware intrusions. Before launching their file-encrypting malware, cybercriminals routinely deploy specialized tools to bypass security software.</p>



<p> According to a comprehensive new report by ESET Research, the threat landscape has grown far beyond the well-known<a href="https://cybersecuritynews.com/hackers-exploiting-checkpoints-driver/" type="post" id="96797" target="_blank" rel="noreferrer noopener"> Bring Your Own Vulnerable Driver (BYOVD)</a> technique. </p>



<p>Attackers are now heavily using driverless methods, custom command-line scripts, and legitimate anti-rootkit utilities to turn off security defenses.</p>



<h2 class="wp-block-heading" id="h-why-attackers-prefer-edr-killers"><strong>Why Attackers Prefer EDR Killers</strong></h2>



<p>Instead of constantly rewriting and updating<a href="https://cybersecuritynews.com/notorious-ransomware-gangs-2023/" type="post" id="53553" target="_blank" rel="noreferrer noopener"> ransomware encryptors </a>to avoid security detection, threat actors find it much easier to turn off the security software first. </p>



<p>EDR killers provide a highly reliable, low-cost solution that gives attackers a predictable window to run their inherently noisy encryption payloads.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="339" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11-1024x339.png" alt="Susanoo EDR killer’s loading screen (Source: EST)" class="wp-image-147172" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11-1024x339.png 1024w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11-300x99.png 300w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11-768x255.png 768w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11-1267x420.png 1267w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11-696x231.png 696w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11-1068x354.png 1068w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11-150x50.png 150w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-11.png 1400w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Susanoo EDR killer’s loading screen </em>(Source: EST)</figcaption></figure>



<p>Interestingly, ESET notes that ransomware affiliates, rather than the core<a href="https://cybersecuritynews.com/ransomware-as-a-service-raas-evolved-as-a-predominant-framework/" type="post" id="104934" target="_blank" rel="noreferrer noopener"> ransomware-as-a-service</a> operators, usually choose which EDR-killer to deploy in an attack. </p>



<p>This dynamic creates massive tooling diversity in the wild, as different affiliates mix and match various EDR killers to suit their specific intrusion needs and skill levels.</p>



<p>While exploiting vulnerable kernel drivers through BYOVD remains the dominant method, the technology behind EDR killers is rapidly expanding. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="420" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10-1024x420.png" alt="Code similarities between kill-floor (Source: EST)" class="wp-image-147171" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10-1024x420.png 1024w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10-300x123.png 300w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10-768x315.png 768w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10-1023x420.png 1023w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10-696x286.png 696w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10-1068x438.png 1068w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10-150x62.png 150w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-10.png 1374w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Code similarities between kill-floor</em> (Source: EST)</figcaption></figure>



<p><a href="https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/" target="_blank" rel="noreferrer noopener nofollow">ESET researchers are currently tracking </a>almost 90 EDR killers actively used in the wild, 54 of which rely on BYOVD to exploit 35 different vulnerable drivers.</p>



<p>Some low-skilled attackers rely on basic command scripts or rebooting the system into Windows Safe Mode to bypass security measures. More sophisticated affiliates weaponize legitimate anti-rootkit programs, such as GMER and PC Hunter. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="564" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9-1024x564.png" alt="The advertisement for DemoKiller (Source: EST)" class="wp-image-147170" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9-1024x564.png 1024w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9-300x165.png 300w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9-768x423.png 768w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9-763x420.png 763w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9-696x383.png 696w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9-1068x588.png 1068w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9-150x83.png 150w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-9.png 1300w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>The advertisement for DemoKiller</em> (Source: EST)</figcaption></figure>



<p>These tools were originally built to remove deep-kernel malware, but their elevated privileges make them ideal weapons for terminating active security processes.</p>



<p>A growing and dangerous trend is the use of driverless EDR killers. <a href="https://cybersecuritynews.com/hackers-abuse-edrsilencer-red-team-tool-to-evade-detection/" target="_blank" rel="noreferrer noopener">Tools like EDRSilencer</a><a href="https://cybersecuritynews.com/hackers-abuse-edrsilencer-red-team-tool-to-evade-detection/" type="post" id="81098" target="_blank" rel="noreferrer noopener"> </a>and EDR-Freeze do not need to interact with the system kernel at all. </p>



<p>Instead, they block network communication between the endpoint and the security backend, or they force the EDR software to freeze in place. Because these methods do not rely on traditional driver vulnerabilities, they are much harder for network defenders to detect.</p>



<p>The ESET investigation categorized the developers of these tools into three main groups. First, closed groups, such as Embargo, DeadLock, and Warlock, develop their own proprietary EDR killers from scratch. </p>



<p>Researchers strongly suspect that groups like Warlock are using <a href="https://cybersecuritynews.com/detecting-phishing-attack-artificial-intelligence/" type="post" id="65518" target="_blank" rel="noreferrer noopener">Artificial Intelligence </a>to assist with writing and updating their EDR killer code.</p>



<p>Second, many attackers modify publicly available proof-of-concept (PoC) code. Open repositories offer ready-to-use templates that attackers easily tweak by changing the programming language or adding simple code obfuscation.</p>



<p>Finally, a booming underground market now offers &#8220;EDR killer as a service&#8221;. Commercial tools are actively sold on dark web forums to affiliates of major ransomware gangs, complete with customer support.</p>



<p>Because these tools are heavily traded and shared, cybersecurity defenders face a major challenge. Analyzing a specific vulnerable driver is no longer enough to identify a specific ransomware gang.</p>



<p>Completely unrelated tools might abuse the same driver, and a single threat group might switch between multiple drivers in different attacks. </p>



<p>As the EDR killer market continues to mature and commercialize, organizations must focus on detecting the behavioral signs of security tampering rather than just tracking specific vulnerable drivers.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/ransomware-gangs-expand-use-of-edr-killers/">Ransomware Gangs Expand Use of EDR Killers Beyond Vulnerable Drivers, ESET Warns</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Ransomware-Gangs-Expand-Use-of-EDR-Killers-Beyond-Vulnerable-Drivers-ESET-Warns-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147168</post-id>	</item>
		<item>
		<title>Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies</title>
		<link>https://cybersecuritynews.com/hacker-uses-claude-and-chatgpt-to-breach/</link>
		
		<dc:creator><![CDATA[Dhivya]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 03:40:28 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147163</guid>

					<description><![CDATA[<p>A single threat actor compromised nine Mexican government agencies and stole hundreds of millions of citizen records in a highly sophisticated cyberattack. The campaign, which ran from late December 2025 through mid-February 2026, highlights a dangerous shift in the modern threat landscape. Researchers at Gambit Security recently released a full technical report detailing how the [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/hacker-uses-claude-and-chatgpt-to-breach/">Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A single threat actor compromised nine Mexican government agencies and <a href="https://cybersecuritynews.com/hacker-from-shinyhunters-group/" target="_blank" rel="noreferrer noopener">stole hundreds of millions of citizen records</a> in a highly sophisticated cyberattack.</p>



<p>The campaign, which ran from late December 2025 through mid-February 2026, highlights a dangerous shift in the modern threat landscape.</p>



<p><a href="https://gambit.security/blog-post/a-single-operator-two-ai-platforms-nine-government-agencies-the-full-technical-report" target="_blank" rel="noreferrer noopener nofollow">Researchers at Gambit Security recently released </a>a full technical report detailing how the attacker relied on two major commercial artificial intelligence platforms. The publication was initially delayed to allow the affected agencies time to complete their incident response efforts.</p>



<h2 class="wp-block-heading" id="h-ai-models-power-the-breach"><strong>AI Models Power the Breach</strong></h2>



<p>The attacker used Anthropic&#8217;s Claude Code and OpenAI&#8217;s GPT-4.1 not just for planning, but as <a href="https://cybersecuritynews.com/user-access-management-tools/" target="_blank" rel="noreferrer noopener">core operational tools</a> that drastically accelerated the attack.</p>



<p>According to forensic evidence recovered, Claude Code generated and executed approximately 75% of all remote commands during the intrusion.</p>



<p>Across 34 active sessions on live victim infrastructure, the hacker logged 1,088 individual prompts. These prompts translated into 5,317 AI-executed commands, demonstrating how deeply the AI was integrated into the exploitation phase.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="553" height="301" src="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-8.png" alt="Claude Breach(Source: cdn)" class="wp-image-147166" srcset="https://cybersecuritynews.com/wp-content/uploads/2026/04/image-8.png 553w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-8-300x163.png 300w, https://cybersecuritynews.com/wp-content/uploads/2026/04/image-8-150x82.png 150w" sizes="auto, (max-width: 553px) 100vw, 553px" /><figcaption class="wp-element-caption">Claude Breach(Source: cdn)</figcaption></figure>



<p>Simultaneously, the attacker leveraged OpenAI&#8217;s GPT-4.1 for rapid reconnaissance and data processing. The hacker developed a custom 17,550-line Python script designed to pipe<a href="https://cybersecuritynews.com/chinese-hackers-using-custom-shadowpad-iis-listener-module/" target="_blank" rel="noreferrer noopener"> raw data harvested from compromised servers</a> directly through the OpenAI API.</p>



<p>This automated system analyzed information across 305 internal servers, rapidly producing 2,597 structured intelligence reports. By automating the data analysis phase, a single operator successfully processed an intelligence volume that would traditionally require an entire team.</p>



<p>The<a href="https://cybersecuritynews.com/what-risks-deepseek-poses-to-cybersecurity/" target="_blank" rel="noreferrer noopener"> integration of artificial intelligence </a>allowed the attacker to turn unfamiliar networks into mapped targets in hours rather than days. Recovered materials showed the attacker possessed over 400 custom attack scripts.</p>



<p>Furthermore, the hacker used AI to quickly develop 20 tailored exploits targeting 20 specific Common Vulnerabilities and Exposures (CVEs). This high-speed capability compressed the attack timeline, allowing the threat actor to operate well below standard detection and response windows.</p>



<p>Despite the advanced methods used in the campaign, the actual vulnerabilities exploited were highly conventional. The targeted government agencies had basic security gaps that enabled the attacker to gain initial access and move laterally.</p>



<p>The underlying issues were addressable through<a href="https://cybersecuritynews.com/key-ai-development-solutions-for-cybersecurity-in-2026/" target="_blank" rel="noreferrer noopener"> standard security controls</a>, highlighting a severe accumulation of technical debt within mission-critical infrastructure.</p>



<p>While artificial intelligence has significantly lowered the cost and complexity of executing widespread cyberattacks, the defense strategy remains rooted in foundational security practices.</p>



<p>Organizations must urgently address unpatched software and implement strict credential rotation policies. Enforcing network segmentation is also critical to restrict lateral movement once a perimeter is breached.</p>



<p>Finally, deploying robust endpoint detection and response tools is necessary to identify these rapidly compressed attack timelines before data exfiltration occurs.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>



<p></p>
<p>The post <a href="https://cybersecuritynews.com/hacker-uses-claude-and-chatgpt-to-breach/">Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Hacker-Uses-Claude-and-ChatGPT-to-Breach-Multiple-Government-Agencies-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147163</post-id>	</item>
		<item>
		<title>Anthropic Launches Claude Beta for Word, Bringing AI-Powered Editing to Microsoft Docs</title>
		<link>https://cybersecuritynews.com/claude-beta-for-word/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Sat, 11 Apr 2026 02:10:43 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147160</guid>

					<description><![CDATA[<p>Anthropic has officially launched Claude for Word in public beta, bringing its AI assistant directly into Microsoft Word as a native sidebar add-in for Team and Enterprise users on both Mac and Windows platforms. The integration marks a significant step in Anthropic&#8217;s push to embed Claude into everyday productivity workflows beyond chat-based interactions. Claude for [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/claude-beta-for-word/">Anthropic Launches Claude Beta for Word, Bringing AI-Powered Editing to Microsoft Docs</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Anthropic has officially launched Claude for Word in public beta, bringing its AI assistant directly into Microsoft Word as a native sidebar add-in for Team and Enterprise users on both Mac and Windows platforms.</p>



<p>The integration marks a significant step in Anthropic&#8217;s push to embed Claude into everyday productivity workflows beyond chat-based interactions.</p>



<p><a href="https://cybersecuritynews.com/claude-code-vulnerability/" target="_blank" rel="noreferrer noopener">Claude</a> for Word enables users to draft, edit, and revise <code>.docx</code> files directly from a persistent sidebar within Microsoft Word, eliminating the need to switch between applications.</p>



<p>Unlike basic clipboard-and-paste AI workflows, the integration preserves native document formatting and surfaces all AI-generated edits as Microsoft Word&#8217;s tracked changes, keeping the revision history intact and fully reviewable by human editors.</p>



<p>This &#8220;AI-powered redlining&#8221; approach means users can prompt Claude to rewrite a section or sharpen an argument, then accept or reject each suggestion just as they would with a human collaborator&#8217;s markup.</p>



<figure class="wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<div class="embed-twitter"><blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">Claude for Word is now in beta.<br><br>Draft, edit, and revise documents directly from the sidebar. Claude preserves your formatting, and edits appear as tracked changes.<br><br>Available on Team and Enterprise plans. <a href="https://t.co/tl1mZVELNg">pic.twitter.com/tl1mZVELNg</a></p>&mdash; Claude (@claudeai) <a href="https://twitter.com/claudeai/status/2042670341915295865?ref_src=twsrc%5Etfw">April 10, 2026</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></div>
</div></figure>



<h2 class="wp-block-heading" id="cross-app-conversations-across-the-office-suite"><strong>Claude Beta for Word</strong></h2>



<p>One of the standout architectural decisions in the beta is shared context across Anthropic&#8217;s Office add-in family. Claude for Word connects directly with Claude for Excel and Claude for PowerPoint, meaning a single conversation thread can span all three open documents simultaneously.</p>



<p>Users can ask Claude to check for data inconsistencies between a Word report and its accompanying Excel model, or align narrative language in a Word file with slide content in PowerPoint, all within a unified AI session. This cross-app continuity addresses a pain point common to multi-document workflows in finance, legal, and consulting environments.</p>



<p>The add-in handles a range of document-centric tasks, including rewriting selected text, responding to inline Word comments, summarizing sections, and auditing documents for factual or stylistic inconsistencies.</p>



<p>Claude can also interpret existing comment threads and deliver revisions that directly address each note, returning an updated document with tracked changes showing every edit made.</p>



<p>Access is currently gated to subscribers of the Claude Team and Enterprise plans, consistent with Anthropic&#8217;s broader strategy of rolling out advanced document automation features to professional and business users first.</p>



<p><a href="https://claude.com/claude-for-word" target="_blank" rel="noreferrer noopener nofollow">The launch arrives amid intensifying competition</a> in the AI productivity space. Microsoft&#8217;s own 365 Copilot already offers deep Word integration, but early users of Claude for Word have noted its smoother document-handling and more coherent multi-app context flow as differentiators.</p>



<p>Anthropic also recently expanded Microsoft 365 data connectivity to all Claude plan tiers, including free users, signaling an intent to deepen its presence across the Microsoft ecosystem rather than compete with it outright.</p>



<p>The beta is available now at claude.com/claude-for-word, with broader plan access expected in upcoming rollout phases.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/claude-beta-for-word/">Anthropic Launches Claude Beta for Word, Bringing AI-Powered Editing to Microsoft Docs</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Claude-Beta-for-Word.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147160</post-id>	</item>
		<item>
		<title>EngageSDK Vulnerability Exposes Millions of Crypto Wallet Users to Cyberattacks</title>
		<link>https://cybersecuritynews.com/engagesdk-vulnerability-exposes-millions/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 17:58:02 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147143</guid>

					<description><![CDATA[<p>A serious security flaw found inside a widely used Android library called EngageSDK has put over 30 million cryptocurrency wallet users at risk of financial theft and personal data exposure. The vulnerability, described as an intent redirection flaw, allowed malicious apps on the same device to break through Android&#8217;s built-in security sandbox and gain unauthorized [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/engagesdk-vulnerability-exposes-millions/">EngageSDK Vulnerability Exposes Millions of Crypto Wallet Users to Cyberattacks</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A serious security flaw found inside a widely used Android library called EngageSDK has put over 30 million cryptocurrency wallet users at risk of financial theft and personal data exposure. </p>



<p>The vulnerability, described as an intent redirection flaw, allowed malicious apps on the same device to break through Android&#8217;s built-in security sandbox and gain <a href="https://cybersecuritynews.com/unauthorized-access-attempts-in-active-directory/" id="106529" target="_blank" rel="noreferrer noopener">unauthorized access</a> to private user data. </p>



<p>With crypto wallets holding real financial assets, a flaw of this nature carries consequences far beyond a standard privacy concern.​</p>



<p>EngageSDK is a third-party software development kit built by a company called EngageLab. It is designed to help developers add push notifications and real-time messaging features to their Android applications. </p>



<p>Developers include it as a code dependency, after which it becomes part of how the app runs. Since so many apps rely on the same SDK, a single flaw inside it does not stay confined to one application — it puts every app built on it at risk at the same time.​</p>



<p>During routine security research, the <a href="https://www.microsoft.com/en-us/security/blog/2026/04/09/intent-redirection-vulnerability-third-party-sdk-android/" id="https://www.microsoft.com/en-us/security/blog/2026/04/09/intent-redirection-vulnerability-third-party-sdk-android/" target="_blank" rel="noreferrer noopener nofollow">Microsoft Defender Security Research Team identified the vulnerability</a> and noted that it resided inside an exported activity called MTCommonActivity. </p>



<p>This activity is silently added to an app&#8217;s merged Android manifest during the build process, meaning it does not appear in the original source code — only in the final compiled output. Because developers often overlook this, the activity goes unreviewed and unprotected. Once the app is installed on a device, that activity becomes reachable by any other app running on the same phone.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-RWWi4qx_5AMVIpbU_s_KLK8giKZb1SbGau5T5TZnfyqClVV3ehVTH4r66NJU9ipxrAWRQ-YIP1vWhrw6LxAz32stL_SZLQYXTAuNLF31Mb8gaeG54MLGhRR6ko1VONF9Q7q1ffugPGWpSNsu9E9lzWq09va0ncHrYHuFMbdQ8yysCtZKXTy-dJNkYzY/s16000/The%20vulnerable%20MTCommonActivity%20activity%20is%20added%20to%20the%20merged%20manifest%20(Source%20-%20Microsoft).webp" alt="The vulnerable MTCommonActivity activity is added to the merged manifest (Source - Microsoft)" /><figcaption class="wp-element-caption">The vulnerable MTCommonActivity activity is added to the merged manifest (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>The extent of this exposure is what makes the vulnerability especially concerning. Crypto wallet apps alone represented over 30 million installations, and when other apps built on the same SDK were counted, total exposure climbed past 50 million installations. </p>



<p>All apps confirmed to be running vulnerable versions were removed from Google Play. At the time of this report, there is no confirmed evidence that the vulnerability was exploited in attacks.​</p>



<p>The flaw was first found in version 4.5.4 of the EngageLab SDK in April 2025. Microsoft reported it to EngageLab through Coordinated Vulnerability Disclosure (CVD) practices under Microsoft Security Vulnerability Research (MSVR). </p>



<p>The issue was then escalated to the Android Security Team in May 2025. EngageLab released a fix in version 5.2.1 on November 3, 2025, which resolved the exposure by setting the vulnerable activity to non-exported.​</p>



<h2 class="wp-block-heading" id="how-the-intent-redirection-attack-works"><strong>How the Intent Redirection Attack Works</strong></h2>



<p>Intent redirection is a technique where an attacker manipulates the contents of a message — called an intent — that a trusted app sends, so it ends up doing something harmful instead. </p>



<p>On Android, intents are the primary way apps communicate with each other and with their own internal components. When a trusted app sends an intent, the Android system honors its permissions. </p>



<p>Attackers exploit this trust to run <a href="https://cybersecuritynews.com/leaknet-scales-ransomware-operations/" id="145260" target="_blank" rel="noreferrer noopener">harmful operations</a> while hiding behind a legitimate application&#8217;s identity.​</p>



<p>A malicious app begins the attack by sending a specially crafted URI to the exposed MTCommonActivity activity. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRHhxKphzpmqb30gSGLyErds-PN54nTObR4IiBVLhblPFOmi_38j_dbch-Yj2GtPbTKb8HV2E5hngDY2TNBPPCfOmzEVhjz2TQie2vqM2EDVNufgO2WO4UneGoGmfYfVw841e7A18ekF2oNNMUmyeqDN-XPXYYrnRmWePPeEgOAGegK7HczhF2cxGeo_0/s16000/Visual%20representation%20of%20an%20intent%20redirection%20(Source%20-%20Microsoft).webp" alt="Visual representation of an intent redirection (Source - Microsoft)" /><figcaption class="wp-element-caption">Visual representation of an intent redirection (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>That activity passes the URI through a method called processIntent(), which forwards it to processPlatformMessage(). </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicjTp3OKjVQioyo5nduv1h_dO_dZdn615oxbBRVP-Y40QALMBz7tkYV6UNvAd_KNN8EsZjKDoVXpIcjZN3-EMpQvCQqbV_Z53hgP5_cLFTPjPXdllOzwEvAiRQzta36GpMVO-ZDVnFHTKd-FuXuakiZAbaEwGie3jKDldLa93Jt-pXcqkkbjbt7AG6aFQ/s16000/The%20processPlatformMessage()%20method%20(Source%20-%20Microsoft).webp" alt="The processPlatformMessage() method (Source - Microsoft)" /><figcaption class="wp-element-caption">The processPlatformMessage() method (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>This method pulls out a field named n_intent_uri, constructs a new intent from it, and launches that intent using the trusted app&#8217;s own permissions. </p>



<p>Since the SDK applies the URI_ALLOW_UNSAFE flag, the malicious input can carry read and write permission flags that grant persistent access to the target app&#8217;s private storage. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAZPq2FDXQ_57t9zdScRz2NL6v9NVWGDbASXbOwNJUu6CmWr8XFyFf4-AzJBz2-tbQC9J6wwPHowmBVxQ28SRcDnwH6a2GHw8f3xMXKfLVP8F9wYpdml_xn5RG0lRr83bhMVkymq-VGPKYOk64hFQ5HFOJDjcKWWWj54DKrU58yXHYVmLGfJ6o03MnhIA/s16000/Getting%20READ%20-%20WRITE%20access%20to%20non-exported%20content%20providers%20(Source%20-%20Microsoft).webp" alt="Getting READ - WRITE access to non-exported content providers (Source - Microsoft)" /><figcaption class="wp-element-caption">Getting READ &#8211; WRITE access to non-exported content providers (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>As a result, wallet credentials, private keys, and sensitive financial data inside the app become silently exposed to the attacker.​</p>



<p>Developers using the EngageLab SDK should upgrade to version 5.2.1 or later without delay. After every project build, developers should carefully inspect the merged Android manifest for any exported activities or unexpected permissions introduced by <a href="https://cybersecuritynews.com/splunk-third-party-packages-soar-versions/" id="115193" target="_blank" rel="noreferrer noopener">third-party libraries</a>. </p>



<p>Intent data arriving from outside the app should always be validated before it is used. Users who previously installed a vulnerable app are now protected, as Android has deployed automatic mitigations targeting this specific flaw while developers complete their updates.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 92%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/engagesdk-vulnerability-exposes-millions/">EngageSDK Vulnerability Exposes Millions of Crypto Wallet Users to Cyberattacks</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/EngageSDK-Vulnerability-Exposes-Millions-of-Crypto-Wallet-Users-to-Cyberattacks.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147143</post-id>	</item>
		<item>
		<title>Hackers Use AiTM Session Hijacking to Redirect Employee Salaries in New Storm-2755 Campaign</title>
		<link>https://cybersecuritynews.com/hackers-use-aitm-session-hijacking/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 17:44:07 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147142</guid>

					<description><![CDATA[<p>A financially motivated threat group called Storm-2755 has launched a campaign that quietly reroutes employee salary payments to attacker-controlled bank accounts. Targeting Canadian workers, the group uses adversary-in-the-middle (AiTM) techniques to hijack authenticated sessions and bypass multi-factor authentication (MFA), in what researchers have labeled &#8220;payroll pirate&#8221; attacks.​ The campaign starts with SEO poisoning and malvertising. [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/hackers-use-aitm-session-hijacking/">Hackers Use AiTM Session Hijacking to Redirect Employee Salaries in New Storm-2755 Campaign</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A financially motivated threat group called Storm-2755 has launched a campaign that quietly reroutes employee salary payments to attacker-controlled bank accounts. </p>



<p>Targeting Canadian workers, the group uses adversary-in-the-middle (AiTM) techniques to hijack authenticated sessions and bypass multi-factor authentication (MFA), in what researchers have labeled &#8220;payroll pirate&#8221; attacks.​</p>



<p>The campaign starts with SEO poisoning and malvertising. Storm-2755 pushes a rogue domain, bluegraintours[.]com, to the top of search results for queries like &#8220;Office 365&#8221; or the common misspelling &#8220;Office 265.&#8221; </p>



<p>Employees who click these links land on a convincing fake Microsoft 365 sign-in page. The moment they type in their credentials, the attackers capture both the password and the live session token in real time, gaining full account access without triggering any <a href="https://cybersecuritynews.com/microsoft-mfa-down/" id="143459" target="_blank" rel="noreferrer noopener">MFA prompt</a>.​</p>



<p><a href="https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/" id="https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/" target="_blank" rel="noreferrer noopener nofollow">Microsoft researchers identified this emerging threat</a> and noted something unusual about its targeting. </p>



<p>Unlike most threat groups that focus on specific industries, Storm-2755 broadly targets Canadian employees across all sectors, using industry-agnostic search terms to cast a wide net. </p>



<p>This approach makes the campaign harder to detect through vertical-specific threat intelligence alone.​</p>



<p>Once inside a compromised account, Storm-2755 silently searches mailboxes for payroll and HR-related keywords. The group then sends emails from the victim&#8217;s own inbox to HR staff, asking about direct deposit changes — a <a href="https://cybersecuritynews.com/social-engineering-tactics/" id="105131" target="_blank" rel="noreferrer noopener">social engineering</a> move that appears completely routine to the recipient. </p>



<p>When email manipulation alone is not enough, attackers manually log into HR platforms like Workday using the stolen session and update banking details directly, causing salary payments to flow into an attacker-held account.​</p>



<p>What makes this campaign especially dangerous is how carefully the group covers its tracks. Storm-2755 renews stolen sessions around 5:00 AM in the victim&#8217;s local time zone to avoid triggering reauthentication events. </p>



<p>Inbox rules are also created to immediately bury any HR responses about the fake bank change request, so victims often have no idea anything has changed until their paycheck simply does not arrive.​</p>



<h2 class="wp-block-heading" id="inside-the-aitm-attack-chain"><strong>Inside the AiTM Attack Chain</strong></h2>



<p>What separates Storm-2755 from older phishing groups is the technical depth of its AiTM method. Rather than simply stealing passwords, AiTM attacks proxy the full authentication flow between the victim and Microsoft&#8217;s real login service. </p>



<p>When the victim signs in, the attacker intercepts both the session cookie and the <a href="https://cybersecuritynews.com/phishing-and-oauth-token-flaws/" id="141720" target="_blank" rel="noreferrer noopener">OAuth access token</a> — and since these represent a fully authenticated session, they can be reused to access Microsoft services without any further credential check or MFA challenge.​</p>



<p>Storm-2755 uses version 1.7.9 of the Axios HTTP client to relay captured tokens to its own infrastructure. Sign-in logs show that Axios made non-interactive sign-ins to OfficeHome approximately every 30 minutes, keeping sessions alive without obvious detection. </p>



<p>A known vulnerability in this library, CVE-2025-27152, can lead to server-side request forgery risks, which the group appears to exploit within this relay flow. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_xWb9tqPxmVAQVNPTxvnRKZ22og9Q8c5Pr67-QYmIK999voMALYcbri5WWqm_d_fNs4ezBpWlBvB14N8yWOgcTNw_AdEd45TLu4ZWdoiRjoVHynFCTZlgntHMCpdisFQeO_vc7ikl8l9Ly0yJzNT-yd_ceMwkN0dHQBP9gHN8Z8pDD0E8liuLvQR3tEM/s16000/Storm-2755%20attack%20flow%20(Source%20-%20Microsoft).webp" alt="Storm-2755 attack flow (Source - Microsoft)" /><figcaption class="wp-element-caption">Storm-2755 attack flow (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>After roughly 30 days of inactivity, stolen tokens expired naturally — but in some cases, attackers had already reset account passwords and MFA settings to sustain access long after the initial compromise.​</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1IgaygWERjtY2fo_bIA4fvxMVO1TAOaSLiCYLFNGI1H9FY5UrH40QTeRsiXsPJMG7diCAAvcuP3bGIlmVku7tTicH5FcgSd2BfBcoCOdbZJWYCHptp-P_BHmwl3SSdyHQXkDl9dcRnsaeeEjfowLFZa2ro4S1RqtugJmUntIelmQrzdfWH4pIEOr1eaU/s16000/Example%20Storm-2755%20direct%20deposit%20email%20(Source%20-%20Microsoft).webp" alt="Example Storm-2755 direct deposit email (Source - Microsoft)" /><figcaption class="wp-element-caption">Example Storm-2755 direct deposit email (Source &#8211; Microsoft)</figcaption></figure>
</div>


<p>This illustrates the convincing message sent from a victim&#8217;s account to trick HR staff into executing the banking change.​</p>



<p>Organizations are strongly advised to revoke compromised tokens immediately, remove malicious inbox rules, and reset credentials and MFA methods for any affected accounts. </p>



<p>Phishing-resistant MFA — such as FIDO2 security keys — should be enforced wherever possible, as these are specifically designed to block AiTM-style token theft. </p>



<p>Conditional Access policies should be configured to limit session lifetimes and require reauthentication when risk signals change. Continuous Access Evaluation (CAE) should be enabled so that stolen tokens lose their value quickly after a risk condition is detected. </p>



<p><a href="https://cybersecuritynews.com/security-teams-shrink-as-automation-rises/" id="100650" target="_blank" rel="noreferrer noopener">Security teams</a> should also set up alerts for suspicious inbox rule creation and regularly audit HR SaaS platforms such as Workday for any unauthorized changes to banking or payment information.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/hackers-use-aitm-session-hijacking/">Hackers Use AiTM Session Hijacking to Redirect Employee Salaries in New Storm-2755 Campaign</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Hackers-Use-AiTM-Session-Hijacking-to-Redirect-Employee-Salaries-in-New-Storm-2755-Campaign.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147142</post-id>	</item>
		<item>
		<title>France to Replace Windows with Linux on Government Desktops</title>
		<link>https://cybersecuritynews.com/france-replace-windows-linux/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 17:29:05 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147144</guid>

					<description><![CDATA[<p>France has taken a decisive step toward digital sovereignty, announcing plans to migrate government workstations from Microsoft Windows to Linux. The move was formally declared during an interministerial seminar held on April 8, 2026, organized by the Interministerial Directorate for Digital Affairs (DINUM), the National Cybersecurity Agency of France (ANSSI), the Directorate General for Enterprises [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/france-replace-windows-linux/">France to Replace Windows with Linux on Government Desktops</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>France has taken a decisive step toward digital sovereignty, announcing plans to migrate government workstations from <a href="https://cybersecuritynews.com/windows-update-breaks-vps-access/" target="_blank" rel="noreferrer noopener">Microsoft Windows to Linux</a>.</p>



<p>The move was formally declared during an interministerial seminar held on April 8, 2026, organized by the Interministerial Directorate for Digital Affairs (DINUM), the National Cybersecurity Agency of France (ANSSI), the Directorate General for Enterprises (DGE), and the State Procurement Directorate (DAE).</p>



<p>The seminar, convened at the initiative of the Prime Minister and the Minister Delegate for Artificial Intelligence and Digital Affairs, brought together ministers, government departments, public operators, and private sector stakeholders. Its central objective is to accelerate France&#8217;s strategy to reduce its digital dependencies on non-European technology vendors.</p>



<h2 class="wp-block-heading" id="the-windows-to-linux-transition"><strong>The Windows-to-Linux Transition</strong></h2>



<p>DINUM officially announced its exit from Windows, signaling a full migration to <a href="https://cybersecuritynews.com/linux-admin-tools/" target="_blank" rel="noreferrer noopener">Linux-based workstations</a> across state infrastructure. While a specific Linux distribution and rollout timeline were not disclosed in the seminar&#8217;s initial announcements, ministries will be required to formalize individual transition plans by fall 2026.</p>



<p>The migration scope spans workstations, collaborative tools, antivirus software, artificial intelligence platforms, databases, virtualization environments, and network equipment.</p>



<p>This shift carries significant cybersecurity implications. Moving away from a proprietary, closed-source OS reduces the government&#8217;s exposure to vendor-specific vulnerabilities and foreign intelligence risks, a concern that ANSSI has long emphasized in national cyber defense guidance.</p>



<p>The Windows migration is part of a wider push toward European digital tools. The National Health Insurance Fund recently announced the migration of its 80,000 agents to interministerial digital platform tools Tchap (secure messaging), Visio (video conferencing), and FranceTransfert (document transfer).</p>



<p>Additionally, the French government confirmed last month that its national health data platform will migrate to a trusted sovereign cloud solution by the end of 2026.</p>



<p><a href="https://www.numerique.gouv.fr/sinformer/espace-presse/souverainete-numerique-reduction-dependances-extra-europeennes/" target="_blank" rel="noreferrer noopener nofollow">These moves follow Prime Minister directives</a>, including circulars on digital public procurement and mandatory adoption of the &#8220;Visio&#8221; video conferencing tool as a Windows-independent collaboration standard.</p>



<p>Rather than a purely top-down mandate, France is forming public-private ministerial coalitions to execute the transition. DINUM will coordinate an interministerial dependency-reduction plan, leveraging digital commons and interoperability standards such as the Open-Interop and OpenBuro initiatives.</p>



<p>The State Procurement Department (DAE) is simultaneously mapping existing technology dependencies to establish quantified reduction targets with clear timelines.</p>



<p>The first &#8220;Industrial Digital Meetings&#8221; are scheduled for June 2026, where DINUM plans to formalize a public-private alliance for European digital sovereignty.</p>



<p>This migration represents one of the most significant government-level OS transitions in recent European history, setting a potential precedent for other EU member states prioritizing technological independence.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 94%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> for daily cybersecurity updates. <a href="https://cybersecuritynews.com/contact-us/" target="_blank" rel="noreferrer noopener nofollow">Contact us</a> to feature your stories.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/france-replace-windows-linux/">France to Replace Windows with Linux on Government Desktops</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/France-Replace-Windows-Linux.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147144</post-id>	</item>
		<item>
		<title>Hackers Use Fake BTS World Tour Ticket Sites to Scam Fans Across Multiple Countries</title>
		<link>https://cybersecuritynews.com/hackers-use-fake-bts-world-tour-ticket-sites/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 13:43:31 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147137</guid>

					<description><![CDATA[<p>Cybercriminals are capitalizing on the excitement around BTS&#8217;s long-awaited return to the world stage by setting up fraudulent ticket websites that steal money from unsuspecting fans. The campaign has already reached fans across nine countries, making it one of the most geographically widespread concert ticket scams seen in recent years.​ BTS, one of the biggest [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/hackers-use-fake-bts-world-tour-ticket-sites/">Hackers Use Fake BTS World Tour Ticket Sites to Scam Fans Across Multiple Countries</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybercriminals are capitalizing on the excitement around BTS&#8217;s long-awaited return to the world stage by setting up fraudulent ticket websites that steal money from unsuspecting fans. </p>



<p>The campaign has already reached fans across nine countries, making it one of the most geographically widespread concert ticket scams seen in recent years.​</p>



<p>BTS, one of the biggest K-pop groups in music history, recently announced their ARIRANG world tour after a near four-year break, during which group members completed mandatory military service in South Korea. </p>



<p>The announcement generated an enormous wave of anticipation, and demand for concert tickets reached extraordinary levels almost immediately. </p>



<p>Events like this, where a globally loved group returns after years away, naturally draw the attention of cybercriminals who see a ready-made opportunity.​</p>



<p><a href="https://www.kaspersky.com/blog/bts-world-tour-scam/55581/?kaspr=46kg" id="https://www.kaspersky.com/blog/bts-world-tour-scam/55581/?kaspr=46kg" target="_blank" rel="noreferrer noopener nofollow">Kaspersky researchers identified at least 10 fraudulent domains</a> created in early April 2026, each designed to mimic official pre-sale pages for BTS concerts in Argentina, Brazil, Chile, Colombia, France, Mexico, Peru, Portugal, and Spain. </p>



<p>The analysts noted that these fake websites replicate the original layout, design, and the full purchasing journey so closely that ordinary users have very little chance of spotting the difference. </p>



<p>The scale and timing of the operation point to a well-coordinated effort rather than a simple or isolated attempt at fraud.​</p>



<p>These fake pages primarily spread through Instagram, where links circulate quickly inside fan communities. </p>



<p>Since BTS&#8217;s fanbase is deeply engaged and emotionally invested, many fans act fast the moment they spot what looks like a genuine chance to secure tickets before they sell out. That impulsive reaction, driven by fear of missing out, is exactly what the attackers are counting on.​</p>



<h2 class="wp-block-heading" id="how-the-scam-manipulates-victims-at-the-payment-st"><strong>How the Scam Manipulates Victims at the Payment Stage</strong></h2>



<p>The payment process is where the deception becomes most effective, particularly in Brazil. Brazilian ticketing services adopted a pre-booking format for the ARIRANG tour, requiring fans to reserve seats online and then pay in person at the box office. </p>



<p>While this format was designed to reduce scalping, it created public confusion, and scammers used that confusion to their advantage.​</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigaaC6JcD4cEcOP4FqyhgalBID90SeNlo3aJmYBZLpbqu3g9XaQb7xR4xWQh_-ooIyac7J9WBzbtbk_2OTvqbJRvvlHbIhAzetBFdUFIhL-ECN4kDDt580e4TYA4gCd6fppXMeGOMfnXyVKhMYGRjsW0d0elxBAWVcn43P5C2XD4FZzypqbQj6iz7FJGM/s16000/Fake%20website%20imitating%20the%20Brazilian%20Ticketmaster%20(Source%20-%20Kaspersky).webp" alt="Fake website imitating the Brazilian Ticketmaster (Source - Kaspersky)" /><figcaption class="wp-element-caption">Fake website imitating the Brazilian Ticketmaster (Source &#8211; Kaspersky)</figcaption></figure>
</div>


<p>Fraudulent Brazilian ticketing pages direct victims to pay through PIX, an instant payment system operated by the Central Bank of Brazil. </p>



<p>Some <a href="https://cybersecuritynews.com/fake-fortinet-sites/" id="139232" target="_blank" rel="noreferrer noopener">fake sites</a> display a card payment option first but then generate error messages or cite high demand to push users toward PIX instead. Once the payment goes through, the money is routed to money mule accounts, making recovery nearly impossible for victims.​</p>



<p>The scam depends heavily on manufactured urgency. Fake error notifications during checkout push fans to act immediately out of fear that their reservation will be lost. </p>



<p>The attackers clearly understand how fast BTS concert tickets disappear on legitimate platforms and have built the entire fake experience around that anxiety. </p>



<p>Brazil&#8217;s new pre-booking system added another layer of believability, causing many victims to trust the process without questioning it.​</p>



<p>Anyone buying event tickets online should take these precautions. Always navigate to ticketing platforms by typing the official web address directly into the browser, rather than clicking links received through <a href="https://cybersecuritynews.com/how-often-do-social-media-algorithms-change/" id="29297" target="_blank" rel="noreferrer noopener">social media</a>, email, or messages. </p>



<p>Check domain names carefully, since scammers often use extra dashes, unusual country codes, or subtle character swaps to imitate real sites. </p>



<p>Confirm that websites include a Privacy Policy and Terms of Use page, though their presence alone does not guarantee legitimacy. In Brazil, any request for online payment during the BTS pre-sale is a clear warning sign, since genuine transactions happen in person. </p>



<p>Anyone who has already made a payment on a <a href="https://cybersecuritynews.com/fake-microsoft-teams-site-weaponized/" id="125129" target="_blank" rel="noreferrer noopener">suspicious site</a> should contact their bank immediately and request a card reissue if payment details were entered. </p>



<p>Enabling real-time banking alerts is also a smart step, as it helps suspicious activity get spotted quickly. Avoid any offer of free or heavily discounted tickets from outside official channels.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/hackers-use-fake-bts-world-tour-ticket-sites/">Hackers Use Fake BTS World Tour Ticket Sites to Scam Fans Across Multiple Countries</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Hackers-Use-Fake-BTS-World-Tour-Ticket-Sites-to-Scam-Fans-Across-Multiple-Countries.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147137</post-id>	</item>
		<item>
		<title>Censys Warns 5,219 Rockwell/Allen-Bradley PLCs Are Exposed Amid Iranian APT Activity</title>
		<link>https://cybersecuritynews.com/censys-warns-5219-rockwell-allen-bradley-plcs/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 13:16:56 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=147130</guid>

					<description><![CDATA[<p>The FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command jointly disclosed on April 7, 2026, that Iranian-affiliated advanced persistent threat (APT) actors are actively targeting internet-facing Rockwell Automation/Allen-Bradley programmable logic controllers (PLCs). These industrial devices are widely used in critical infrastructure, including water treatment plants, energy facilities, and government operations. The advisory, labeled AA26-097A, [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/censys-warns-5219-rockwell-allen-bradley-plcs/">Censys Warns 5,219 Rockwell/Allen-Bradley PLCs Are Exposed Amid Iranian APT Activity</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command jointly disclosed on April 7, 2026, that Iranian-affiliated advanced persistent threat (APT) actors are actively targeting internet-facing Rockwell Automation/Allen-Bradley programmable logic controllers (PLCs). </p>



<p>These industrial devices are widely used in critical infrastructure, including water treatment plants, energy facilities, and government operations. </p>



<p>The advisory, labeled AA26-097A, confirmed that this threat is ongoing and poses a serious risk to operational technology (OT) environments across the United States and beyond.​</p>



<p>The threat actors behind this campaign are linked to the Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC) and have been tracked under multiple aliases, including CyberAv3ngers, Shahid Kaveh Group, Storm-0784, Bauxite, and UNC5691. </p>



<p>Beginning in November 2023, the same group compromised at least 75 Unitronics PLCs across U.S. water and wastewater facilities, as documented in CISA advisory AA23-335A. </p>



<p>The current campaign, active since at least March 2026, marks a significant escalation now targeting <a href="https://cybersecuritynews.com/rockwell-automation-devices-flaw-let-hackers-gain-unauthorized-access/" id="73305" target="_blank" rel="noreferrer noopener">Rockwell devices</a>.​</p>



<p><a href="https://censys.com/blog/iranian-affiliated-apt-targeting-rockwell-allen-bradley-plcs/" id="https://censys.com/blog/iranian-affiliated-apt-targeting-rockwell-allen-bradley-plcs/" target="_blank" rel="noreferrer noopener nofollow">Censys researchers identified 5,219 internet-exposed hosts</a> globally that respond to EtherNet/IP (EIP) on port 44818 and self-identify as Rockwell Automation/Allen-Bradley devices — representing the full attack surface tied to this advisory. </p>



<p>The United States alone accounts for 74.6% of that exposure, with 3,891 hosts at risk. Countries like Spain (110 hosts), Taiwan (78), and Italy (73) also showed notable exposure.</p>



<p></p>



<p><strong>Figure 1: Global Distribution of Internet-Exposed Rockwell/Allen-Bradley PLC Hosts</strong>.​</p>



<p>What makes this campaign particularly concerning is that the threat actors are not using zero-day exploits. Instead, they are using Rockwell&#8217;s own legitimate engineering software — Studio 5000 Logix Designer — to access internet-facing PLCs directly. </p>



<p>This allows them to read and modify project files and manipulate HMI/SCADA display screens, making the activity harder to detect. </p>



<p>Confirmed targeted device families include CompactLogix and Micro850, while additional OT protocols such as Modbus (port 502) and S7 (port 102) are also being actively probed, suggesting the group may be extending its targeting across multiple vendor platforms.​</p>



<p>A large share of exposed devices — nearly 49.1% of the global total — sit behind Verizon Business cellular modems, with AT&amp;T Mobility accounting for another 13.3%. </p>



<p>Many of these PLCs are field-deployed at pump stations, electrical substations, and municipal facilities, connected to the internet through cellular modems rather than secure network links. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN6tpOLcBiUolCPRxZ54GLSb6JGlKCifjbyT1xyrhz-zDrMxf_FMElZ7xz6c8DX9BsOYW-uQXjj9VFgitUq6NnvjqNeMcb4XlF0v0SHs1s-iG3ChXrZBMw_Z5iBjSdlXHSVZhul6_lfyBC5M2FrQohW8zH8sNP1bTHSN0qWFQtSkv7YgbNuTtfmizYlPU/s16000/Top%2015%20ASNs%20Hosting%20Internet-Exposed%20Rockwell%20-%20Allen-Bradley%20PLCs%20(Source%20-%20Censys).webp" alt="Top 15 ASNs Hosting Internet-Exposed Rockwell - Allen-Bradley PLCs (Source - Censys)" /><figcaption class="wp-element-caption">Top 15 ASNs Hosting Internet-Exposed Rockwell &#8211; Allen-Bradley PLCs (Source &#8211; Censys)</figcaption></figure>
</div>


<p>The heavy presence of consumer and mobile carrier networks over industrial ASNs highlights a widespread and often overlooked deployment risk that demands attention.​</p>



<h2 class="wp-block-heading" id="expanded-attack-surface-co-exposed-services-and-io"><strong>Expanded Attack Surface: Co-Exposed Services and IOC Analysis</strong></h2>



<p>Beyond EIP exposure, Censys protocol enumeration across the 5,219 hosts revealed significant co-exposed services that widen the attack surface.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlTL0aYj9l4bmzZBsIrlof5quSshobKAFJgCOWOyUl-86_PGVzVs5wMBauep-MM55ZYjfFzjZhLFUTM8HzYnnBqVEDhwtLdB-8d3StzOnwOWzCAAT-ReK1k9pSpSv3gfmICWNLCZaqGj-faf3wCkdQVGO-KzRImUYcDY2bfRuLkWdb5yr_cbOFryJDufQ/s16000/Co-Exposed%20Protocols%20on%20Rockwell%20-%20Allen-Bradley%20PLC%20Hosts%20(Source%20-%20Censys).webp" alt="Co-Exposed Protocols on Rockwell - Allen-Bradley PLC Hosts (Source - Censys)" /><figcaption class="wp-element-caption">Co-Exposed Protocols on Rockwell &#8211; Allen-Bradley PLC Hosts (Source &#8211; Censys)</figcaption></figure>
</div>


<p>VNC services were found on 771 instances — giving attackers direct remote desktop access to HMI workstations. </p>



<p>Telnet appeared on 280 hosts and Modbus on 292, both adding further unprotected entry points that are directly consistent with the attack behaviors described in AA26-097A.​</p>



<p>On the IOC front, Censys pivoting of the published indicators revealed that CISA&#8217;s seven 185.82.73.x <a href="https://cybersecuritynews.com/911-s5-botnet-dismantled/" id="66150" target="_blank" rel="noreferrer noopener">IP addresses</a> actually represent a single multi-homed Windows engineering workstation running the full Rockwell toolchain — not seven separate machines.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP7loc0SW_4iYm8lyhRH8jIkck2vtAVKUoeMJ0VqTpZlywxAO6S7UaiDtYDinM0eZHWLhctPilUn1_beA5wfjSbFbZwR8b3Wneagqy4usJDF5oeYwmc7BJgQphJI-rXDgw9MubDwroo2us_YCYPvKfQUo6RLDd09CMt6SQIzZcAHwuxWXSjuOM8z4Co_0/s16000/Service%20Lifecycle%20of%20135.136.1.133%20(Source%20-%20Censys).webp" alt="Service Lifecycle of 135.136.1.133 (Source - Censys)" /><figcaption class="wp-element-caption">Service Lifecycle of 135.136.1.133 (Source &#8211; Censys)</figcaption></figure>
</div>


<p>Four additional operator IPs on that same host were absent from the advisory. A separate staging box at 135.136.1.133 was provisioned in February 2026, activated for a carefully timed four-day window in mid-March, then completely abandoned.</p>



<p>Organizations running Rockwell/Allen-Bradley PLCs should immediately remove these devices from direct internet exposure. </p>



<p>For CompactLogix and MicroLogix devices, placing the physical mode switch in RUN position is the single most effective control that cannot be overridden remotely. </p>



<p>Administrators should disable VNC, Telnet, and FTP on any host co-located with a PLC, implement <a href="https://cybersecuritynews.com/microsoft-multi-factor-authentication-issue/" id="88334" target="_blank" rel="noreferrer noopener">multi-factor authentication</a> for all remote OT access, and audit MicroLogix 1400 deployments running end-of-sale firmware versions C/21.02 and C/21.07. </p>



<p>All inbound traffic on TCP ports 44818, 2222, 102, 502, and 22 from known operator IPs — including the newly identified addresses 185.82.73.160, .161, .163, and .166 — should be reviewed immediately.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener nofollow">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener nofollow">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener nofollow">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener nofollow">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/censys-warns-5219-rockwell-allen-bradley-plcs/">Censys Warns 5,219 Rockwell/Allen-Bradley PLCs Are Exposed Amid Iranian APT Activity</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/04/Censys-Warns-5219-Rockwell-Allen-Bradley-PLCs-Are-Exposed-Amid-Iranian-APT-Activity.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">147130</post-id>	</item>
	</channel>
</rss>
