FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WIRED

'Happy Gilmore' Producer Buys Spyware Maker NSO Group

By: Lily Hay Newman — October 11th 2025 at 10:30
Plus: US government cybersecurity staffers get reassigned to do immigration work, a hack exposes sensitive age-verification data of Discord users, and more.
☐ ☆ ✇ WIRED

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

By: Lily Hay Newman — October 10th 2025 at 09:15
With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses that could bring the max total reward for iPhone exploits to $5 million.
☐ ☆ ✇ Krebs on Security

ShinyHunters Wage Broad Corporate Extortion Spree

By: BrianKrebs — October 7th 2025 at 22:45

A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they refuse to pay a ransom. The group also claimed responsibility for a recent breach involving Discord user data, and for stealing terabytes of sensitive files from thousands of customers of the enterprise software maker Red Hat.

The new extortion website tied to ShinyHunters (UNC6040), which threatens to publish stolen data unless Salesforce or individual victim companies agree to pay a ransom.

In May 2025, a prolific and amorphous English-speaking cybercrime group known as ShinyHunters launched a social engineering campaign that used voice phishing to trick targets into connecting a malicious app to their organization’s Salesforce portal.

The first real details about the incident came in early June, when the Google Threat Intelligence Group (GTIG) warned that ShinyHunters — tracked by Google as UNC6040 — was extorting victims over their stolen Salesforce data, and that the group was poised to launch a data leak site to publicly shame victim companies into paying a ransom to keep their records private. A month later, Google acknowledged that one of its own corporate Salesforce instances was impacted in the voice phishing campaign.

Last week, a new victim shaming blog dubbed “Scattered LAPSUS$ Hunters” began publishing the names of companies that had customer Salesforce data stolen as a result of the May voice phishing campaign.

“Contact us to negotiate this ransom or all your customers data will be leaked,” the website stated in a message to Salesforce. “If we come to a resolution all individual extortions against your customers will be withdrawn from. Nobody else will have to pay us, if you pay, Salesforce, Inc.”

Below that message were more than three dozen entries for companies that allegedly had Salesforce data stolen, including Toyota, FedEx, Disney/Hulu, and UPS. The entries for each company specified the volume of stolen data available, as well as the date that the information was retrieved (the stated breach dates range between May and September 2025).

Image: Mandiant.

On October 5, the Scattered LAPSUS$ Hunters victim shaming and extortion blog announced that the group was responsible for a breach in September involving a GitLab server used by Red Hat that contained more than 28,000 Git code repositories, including more than 5,000 Customer Engagement Reports (CERs).

“Alot of folders have their client’s secrets such as artifactory access tokens, git tokens, azure, docker (redhat docker, azure containers, dockerhub), their client’s infrastructure details in the CERs like the audits that were done for them, and a whole LOT more, etc.,” the hackers claimed.

Their claims came several days after a previously unknown hacker group calling itself the Crimson Collective took credit for the Red Hat intrusion on Telegram.

Red Hat disclosed on October 2 that attackers had compromised a company GitLab server, and said it was in the process of notifying affected customers.

“The compromised GitLab instance housed consulting engagement data, which may include, for example, Red Hat’s project specifications, example code snippets, internal communications about consulting services, and limited forms of business contact information,” Red Hat wrote.

Separately, Discord has started emailing users affected by another breach claimed by ShinyHunters. Discord said an incident on September 20 at a “third-party customer service provider” impacted a “limited number of users” who communicated with Discord customer support or Trust & Safety teams. The information included Discord usernames, emails, IP address, the last four digits of any stored payment cards, and government ID images submitted during age verification appeals.

The Scattered Lapsus$ Hunters claim they will publish data stolen from Salesforce and its customers if ransom demands aren’t paid by October 10. The group also claims it will soon begin extorting hundreds more organizations that lost data in August after a cybercrime group stole vast amounts of authentication tokens from Salesloft, whose AI chatbot is used by many corporate websites to convert customer interaction into Salesforce leads.

In a communication sent to customers today, Salesforce emphasized that the theft of any third-party Salesloft data allegedly stolen by ShinyHunters did not originate from a vulnerability within the core Salesforce platform. The company also stressed that it has no plans to meet any extortion demands.

“Salesforce will not engage, negotiate with, or pay any extortion demand,” the message to customers read. “Our focus is, and remains, on defending our environment, conducting thorough forensic analysis, supporting our customers, and working with law enforcement and regulatory authorities.”

The GTIG tracked the group behind the Salesloft data thefts as UNC6395, and says the group has been observed harvesting the data for authentication tokens tied to a range of cloud services like Snowflake and Amazon’s AWS.

Google catalogs Scattered Lapsus$ Hunters by so many UNC names (throw in UNC6240 for good measure) because it is thought to be an amalgamation of three hacking groups — Scattered Spider, Lapsus$ and ShinyHunters. The members of these groups hail from many of the same chat channels on the Com, a mostly English-language cybercriminal community that operates across an ocean of Telegram and Discord servers.

The Scattered Lapsus$ Hunters darknet blog is currently offline. The outage appears to have coincided with the disappearance of the group’s new clearnet blog — breachforums[.]hn — which vanished after shifting its Domain Name Service (DNS) servers from DDoS-Guard to Cloudflare.

But before it died, the websites disclosed that hackers were exploiting a critical zero-day vulnerability in Oracle’s E-Business Suite software. Oracle has since confirmed that a security flaw tracked as CVE-2025-61882 allows attackers to perform unauthenticated remote code execution, and is urging customers to apply an emergency update to address the weakness.

Mandiant’s Charles Carmakal shared on LinkedIn that CVE-2025-61882 was initially exploited in August 2025 by the Clop ransomware gang to steal data from Oracle E-Business Suite servers. Bleeping Computer writes that news of the Oracle zero-day first surfaced on the Scattered Lapsus$ Hunters blog, which published a pair of scripts that were used to exploit vulnerable Oracle E-Business Suite instances.

On Monday evening, KrebsOnSecurity received a malware-laced message from a reader that threatened physical violence unless their unstated demands were met. The missive, titled “Shiny hunters,” contained the hashtag $LAPSU$$SCATEREDHUNTER, and urged me to visit a page on limewire[.]com to view their demands.

A screenshot of the phishing message linking to a malicious trojan disguised as a Windows screensaver file.

KrebsOnSecurity did not visit this link, but instead forwarded it to Mandiant, which confirmed that similar menacing missives were sent to employees at Mandiant and other security firms around the same time.

The link in the message fetches a malicious trojan disguised as a Windows screensaver file (Virustotal’s analysis on this malware is here). Simply viewing the booby-trapped screensaver on a Windows PC is enough to cause the bundled trojan to launch in the background.

Mandiant’s Austin Larsen said the trojan is a commercially available backdoor known as ASYNCRAT, a .NET-based backdoor that communicates using a custom binary protocol over TCP, and can execute shell commands and download plugins to extend its features.

A scan of the malicious screensaver file at Virustotal.com shows it is detected as bad by nearly a dozen security and antivirus tools.

“Downloaded plugins may be executed directly in memory or stored in the registry,” Larsen wrote in an analysis shared via email. “Capabilities added via plugins include screenshot capture, file transfer, keylogging, video capture, and cryptocurrency mining. ASYNCRAT also supports a plugin that targets credentials stored by Firefox and Chromium-based web browsers.”

Malware-laced targeted emails are not out of character for certain members of the Scattered Lapsus$ Hunters, who have previously harassed and threatened security researchers and even law enforcement officials who are investigating and warning about the extent of their attacks.

With so many big data breaches and ransom attacks now coming from cybercrime groups operating on the Com, law enforcement agencies on both sides of the pond are under increasing pressure to apprehend the criminal hackers involved. In late September, prosecutors in the U.K. charged two alleged Scattered Spider members aged 18 and 19 with extorting at least $115 million in ransom payments from companies victimized by data theft.

U.S. prosecutors heaped their own charges on the 19 year-old in that duo — U.K. resident Thalha Jubair — who is alleged to have been involved in data ransom attacks against Marks & Spencer and Harrods, the British food retailer Co-op Group, and the 2023 intrusions at MGM Resorts and Caesars Entertainment. Jubair also was allegedly a key member of LAPSUS$, a cybercrime group that broke into dozens of technology companies beginning in late 2021.

A Mastodon post by Kevin Beaumont, lamenting the prevalence of major companies paying millions to extortionist teen hackers, refers derisively to Thalha Jubair as a part of an APT threat known as “Advanced Persistent Teenagers.”

In August, convicted Scattered Spider member and 20-year-old Florida man Noah Michael Urban was sentenced to 10 years in federal prison and ordered to pay roughly $13 million in restitution to victims.

In April 2025, a 23-year-old Scottish man thought to be an early Scattered Spider member was extradited from Spain to the U.S., where he is facing charges of wire fraud, conspiracy and identity theft. U.S. prosecutors allege Tyler Robert Buchanan and co-conspirators hacked into dozens of companies in the United States and abroad, and that he personally controlled more than $26 million stolen from victims.

Update, Oct. 8, 8:59 a.m. ET: A previous version of this story incorrectly referred to the malware sent by the reader as a Windows screenshot file. Rather, it is a Windows screensaver file.

☐ ☆ ✇ WIRED

Vibe Coding Is the New Open Source—in the Worst Way Possible

By: Lily Hay Newman — October 6th 2025 at 10:00
As developers increasingly lean on AI-generated code to build out their software—as they have with open source in the past—they risk introducing critical security failures along the way.
☐ ☆ ✇ WIRED

Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure

By: Matt Burgess, Andy Greenberg, Andrew Couts — October 4th 2025 at 10:30
Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.
☐ ☆ ✇ WIRED

Google’s Latest AI Ransomware Defense Only Goes So Far

By: Lily Hay Newman — September 30th 2025 at 13:44
Google has launched a new AI-based protection in Drive for desktop that can shut down an attack before it spreads—but its benefits have their limits.
☐ ☆ ✇ WIRED

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

By: Andy Greenberg, Matt Burgess, Lily Hay Newman — September 27th 2025 at 14:25
Plus: A ransomeware gang steals data on 8,000 preschoolers, Microsoft blocks Israel’s military from using its cloud for surveillance, call-recording app Neon hits pause over security holes, and more.
☐ ☆ ✇ WIRED

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

By: Matt Burgess — September 22nd 2025 at 06:00
The UK-based automaker has been forced to stop vehicle production as a result of the attack—costing JLR tens of millions of dollars and forcing its parts suppliers to lay off workers.
☐ ☆ ✇ WIRED

A Dangerous Worm Is Eating Its Way Through Software Packages

By: Lily Hay Newman, Andy Greenberg — September 20th 2025 at 10:30
Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested.
☐ ☆ ✇ WIRED

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic

By: Matt Burgess, Lily Hay Newman — September 18th 2025 at 15:09
A pair of flaws in Microsoft's Entra ID identity and access management system could have allowed an attacker to gain access to virtually all Azure customer accounts.
☐ ☆ ✇ WIRED

Cybercriminals Have a Weird New Way to Target You With Scam Texts

By: Matt Burgess — September 18th 2025 at 11:00
Scammers are now using “SMS blasters” to send out up to 100,000 texts per hour to phones that are tricked into thinking the devices are cell towers. Your wireless carrier is powerless to stop them.
☐ ☆ ✇ WIRED

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

By: Andy Greenberg — September 16th 2025 at 17:07
A misconfigured platform used by the Department of Homeland Security left national security information—including some related to the surveillance of Americans—accessible to thousands of people.
☐ ☆ ✇ WIRED

Jeffrey Epstein’s Yahoo Inbox Revealed

By: Lily Hay Newman, Dell Cameron — September 13th 2025 at 10:30
Plus: ICE deploys secretive phone surveillance tech, officials warn of Chinese surveillance tools in US highway infrastructure, and more.
☐ ☆ ✇ WIRED

Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

By: Lily Hay Newman — September 11th 2025 at 13:59
Alongside new iPhones, Apple released a new security architecture on Tuesday: Memory Integrity Enforcement aims to eliminate the most frequently exploited class of iOS bugs.
☐ ☆ ✇ WIRED

US Investment in Spyware Is Skyrocketing

By: Vas Panagiotopoulos — September 10th 2025 at 11:00
A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology.
☐ ☆ ✇ WIRED

Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

By: Dell Cameron — September 9th 2025 at 21:00
After 25 years at the Electronic Frontier Foundation, Cindy Cohn is stepping down as executive director. In a WIRED interview, she reflects on encryption, AI, and why she’s not ready to quit the battle.
☐ ☆ ✇ Security – Cisco Blog

Packing More Power Into Cisco XDR’s Integration Toolkit

By: Ben Greenbaum — September 9th 2025 at 12:00
Cisco XDR and the Swiss Army knife share a theme of a versatile, integrated, and unified platform, giving users myriad solutions to take on diverse challenges.
☐ ☆ ✇ WIRED

ICE Has Spyware Now

By: Matt Burgess, Andy Greenberg, Lily Hay Newman — September 6th 2025 at 10:30
Plus: An AI chatbot system is linked to a widespread hack, details emerge of a US plan to plant a spy device in North Korea, your job’s security training isn’t working, and more.
☐ ☆ ✇ WIRED

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

By: Andy Greenberg — September 3rd 2025 at 21:04
A new specimen of “infostealer” malware offers a disturbing feature: It monitors a target's browser for NSFW content, then takes simultaneous screenshots and webcam photos of the victim.
☐ ☆ ✇ Security – Cisco Blog

Conference Hopping: Training Attendee Scanning Def Con

By: Bilal Qamar — September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ ☆ ✇ Security – Cisco Blog

Driving Cisco XDR Integration With Third-Party Partners at Black Hat

By: Aditya Sankar — September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ ☆ ✇ Security – Cisco Blog

Cisco Secure Firewall: SnortML at Black Hat USA 2025

By: Adam Kilgore — September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ ☆ ✇ Security – Cisco Blog

Black Hat Investigation: Attempted Exploitation of Registration Server

By: Bilal Qamar — September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ ☆ ✇ Security – Cisco Blog

The Value of PCAP in Firewall Investigations

By: Steve Nowell — September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ ☆ ✇ WIRED

DOGE Put Everyone’s Social Security Data at Risk, Whistleblower Claims

By: Andy Greenberg, Lily Hay Newman, Dell Cameron — August 30th 2025 at 10:30
Plus: China’s Salt Typhoon hackers target 600 companies in 80 countries, Tulsi Gabbard purges CIA agents, hackers knock out Iranian ship communications, and more.
☐ ☆ ✇ WIRED

The Era of AI-Generated Ransomware Has Arrived

By: Lily Hay Newman, Matt Burgess — August 27th 2025 at 12:36
Cybercriminals are increasingly using generative AI tools to fuel their attacks, with new research finding instances of AI being used to develop ransomware.
☐ ☆ ✇ WIRED

493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds

By: Matt Burgess, Lily Hay Newman — August 19th 2025 at 14:11
Scam compounds in Cambodia, Myanmar, and Laos have conned people out of billions. New research shows they may be linked to child sextortion crimes too.
☐ ☆ ✇ Security – Cisco Blog

Findings Report From the SOC at RSAC™ 2025 Conference

By: Jessica (Bair) Oppenheimer — August 19th 2025 at 12:00
Cisco Security and Splunk protected RSAC™ 2025 Conference in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ ☆ ✇ WIRED

Russia Is Cracking Down on End-to-End Encrypted Calls

By: Lily Hay Newman — August 16th 2025 at 10:30
Plus: ICE agents accidentally add a random person to a sensitive group chat, Norwegian intelligence blames the Kremlin for hacking a dam, and new facial recognition vans roam the UK.
☐ ☆ ✇ WIRED

The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived

By: Lily Hay Newman — August 14th 2025 at 10:20
The breach of the US Courts records system came to light more than a month after the attack was discovered. Details about what was exposed—and who’s responsible—remain unclear.
☐ ☆ ✇ WIRED

Inside the Multimillion-Dollar Gray Market for Video Game Cheats

By: Matt Burgess — August 11th 2025 at 10:00
Gaming cheats are the bane of the video game industry—and a hot commodity. A recent study found that cheat creators are making a fortune from gamers looking to gain a quick edge.
☐ ☆ ✇ WIRED

How to Protect Yourself From Portable Point-of-Sale Scams

By: Diego Barbera — August 10th 2025 at 10:00
POS scams are difficult but not impossible to pull off. Here's how they work—and how you can protect yourself.
☐ ☆ ✇ WIRED

The US Court Records System Has Been Hacked

By: Dell Cameron, Andrew Couts — August 9th 2025 at 10:30
Plus: Instagram sparks a privacy backlash over its new map feature, hackers steal data from Google's customer support system, and the true scope of the Columbia University hack comes into focus.
☐ ☆ ✇ WIRED

Ex-NSA Chief Paul Nakasone Has a Warning for the Tech World

By: Lily Hay Newman — August 8th 2025 at 23:21
At the Defcon security conference in Las Vegas on Friday, Nakasone tried to thread the needle in a politically fraught moment while hinting at major changes for the tech community around the corner.
☐ ☆ ✇ WIRED

Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

By: Andy Greenberg — August 8th 2025 at 20:20
Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics—that are sold with Securam Prologic locks.
☐ ☆ ✇ WIRED

A Misconfiguration That Haunts Corporate Streaming Platforms Could Expose Sensitive Data

By: Lily Hay Newman — August 8th 2025 at 17:00
A security researcher discovered that flawed API configurations are plaguing corporate livestreaming platforms, potentially exposing internal company meetings—and he's releasing a tool to find them.
☐ ☆ ✇ WIRED

It Looks Like a School Bathroom Smoke Detector. A Teen Hacker Showed It Could Be an Audio Bug

By: Andy Greenberg, Joseph Cox — August 8th 2025 at 13:00
A pair of hackers found that a vape detector often found in high school bathrooms contained microphones—and security weaknesses that could allow someone to turn it into a secret listening device.
☐ ☆ ✇ WIRED

Encryption Made for Police and Military Radios May Be Easily Cracked

By: Kim Zetter — August 7th 2025 at 18:09
Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that could allow an attacker to listen in.
☐ ☆ ✇ WIRED

A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT

By: Matt Burgess — August 6th 2025 at 23:30
Security researchers found a weakness in OpenAI’s Connectors, which let you hook up ChatGPT to other services, that allowed them to extract data from a Google Drive without any user interaction.
☐ ☆ ✇ WIRED

Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home

By: Matt Burgess — August 6th 2025 at 13:00
For likely the first time ever, security researchers have shown how AI can be hacked to create real world havoc, allowing them to turn off lights, open smart shutters, and more.
☐ ☆ ✇ WIRED

Google Will Use AI to Guess People’s Ages Based on Search History

By: Dell Cameron — August 2nd 2025 at 10:30
Plus: A former top US cyber official loses her new job due to political backlash, Congress is rushing through a bill to censor lawmakers’ personal information online, and more.
☐ ☆ ✇ WIRED

The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware

By: Andy Greenberg — July 31st 2025 at 16:00
The FSB cyberespionage group known as Turla seems to have used its control of Russia’s network infrastructure to meddle with web traffic and trick diplomats into infecting their computers.
☐ ☆ ✇ WIRED

Microsoft Put Older Versions of SharePoint on Life Support. Hackers Are Taking Advantage

By: Lily Hay Newman — July 23rd 2025 at 21:59
Multiple hacking groups—including state actors from China—have targeted a vulnerability in older, on-premises versions of the file-sharing tool after a flawed attempt to patch it.
☐ ☆ ✇ Security – Cisco Blog

Customize Your Defense: Unlock Cisco XDR With Key Integrations

By: Ben Greenbaum — July 23rd 2025 at 12:00
The new Cisco XDR Connect tool helps users to search, browse, and view the details of all available XDR integrations and automation content.
☐ ☆ ✇ WIRED

China’s Salt Typhoon Hackers Breached the US National Guard for Nearly a Year

Plus: Secret IRS data-sharing with ICE, a 20-year-old hackable vulnerability in train brakes, and more.
☐ ☆ ✇ WIRED

How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies

By: Kim Zetter — July 18th 2025 at 15:28
A new report traces the history of the early wave of Chinese hackers who became the backbone of the state's espionage apparatus.
☐ ☆ ✇ WIRED

Hackers Are Finding New Ways to Hide Malware in DNS Records

By: Dan Goodin, Ars Technica — July 17th 2025 at 11:30
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious code and prompt injection attacks against chatbots.
☐ ☆ ✇ WIRED

4 Arrested Over Scattered Spider Hacking Spree

Plus: An “explosion” of AI-generated child abuse images is taking over the web, a Russian professional basketball player is arrested on ransomware charges, and more.
☐ ☆ ✇ Krebs on Security

UK Arrests Four in ‘Scattered Spider’ Ransom Group

By: BrianKrebs — July 10th 2025 at 17:31

Authorities in the United Kingdom this week arrested four people aged 17 to 20 in connection with recent data theft and extortion attacks against the retailers Marks & Spencer and Harrods, and the British food retailer Co-op Group. The breaches have been linked to a prolific but loosely-affiliated cybercrime group dubbed “Scattered Spider,” whose other recent victims include multiple airlines.

The U.K.’s National Crime Agency (NCA) declined verify the names of those arrested, saying only that they included two males aged 19, another aged 17, and 20-year-old female.

Scattered Spider is the name given to an English-speaking cybercrime group known for using social engineering tactics to break into companies and steal data for ransom, often impersonating employees or contractors to deceive IT help desks into granting access. The FBI warned last month that Scattered Spider had recently shifted to targeting companies in the retail and airline sectors.

KrebsOnSecurity has learned the identities of two of the suspects. Multiple sources close to the investigation said those arrested include Owen David Flowers, a U.K. man alleged to have been involved in the cyber intrusion and ransomware attack that shut down several MGM Casino properties in September 2023. Those same sources said the woman arrested is or recently was in a relationship with Flowers.

Sources told KrebsOnSecurity that Flowers, who allegedly went by the hacker handles “bo764,” “Holy,” and “Nazi,” was the group member who anonymously gave interviews to the media in the days after the MGM hack. His real name was omitted from a September 2024 story about the group because he was not yet charged in that incident.

The bigger fish arrested this week is 19-year-old Thalha Jubair, a U.K. man whose alleged exploits under various monikers have been well-documented in stories on this site. Jubair is believed to have used the nickname “Earth2Star,” which corresponds to a founding member of the cybercrime-focused Telegram channel “Star Fraud Chat.”

In 2023, KrebsOnSecurity published an investigation into the work of three different SIM-swapping groups that phished credentials from T-Mobile employees and used that access to offer a service whereby any T-Mobile phone number could be swapped to a new device. Star Chat was by far the most active and consequential of the three SIM-swapping groups, who collectively broke into T-Mobile’s network more than 100 times in the second half of 2022.

Jubair allegedly used the handles “Earth2Star” and “Star Ace,” and was a core member of a prolific SIM-swapping group operating in 2022. Star Ace posted this image to the Star Fraud chat channel on Telegram, and it lists various prices for SIM-swaps.

Sources tell KrebsOnSecurity that Jubair also was a core member of the LAPSUS$ cybercrime group that broke into dozens of technology companies in 2022, stealing source code and other internal data from tech giants including Microsoft, Nvidia, Okta, Rockstar Games, Samsung, T-Mobile, and Uber.

In April 2022, KrebsOnSecurity published internal chat records from LAPSUS$, and those chats indicated Jubair was using the nicknames Amtrak and Asyntax. At one point in the chats, Amtrak told the LAPSUS$ group leader not to share T-Mobile’s logo in images sent to the group because he’d been previously busted for SIM-swapping and his parents would suspect he was back at it again.

As shown in those chats, the leader of LAPSUS$ eventually decided to betray Amtrak by posting his real name, phone number, and other hacker handles into a public chat room on Telegram.

In March 2022, the leader of the LAPSUS$ data extortion group exposed Thalha Jubair’s name and hacker handles in a public chat room on Telegram.

That story about the leaked LAPSUS$ chats connected Amtrak/Asyntax/Jubair to the identity “Everlynn,” the founder of a cybercriminal service that sold fraudulent “emergency data requests” targeting the major social media and email providers. In such schemes, the hackers compromise email accounts tied to police departments and government agencies, and then send unauthorized demands for subscriber data while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death.

The roster of the now-defunct “Infinity Recursion” hacking team, from which some member of LAPSUS$ hail.

Sources say Jubair also used the nickname “Operator,” and that until recently he was the administrator of the Doxbin, a long-running and highly toxic online community that is used to “dox” or post deeply personal information on people. In May 2024, several popular cybercrime channels on Telegram ridiculed Operator after it was revealed that he’d staged his own kidnapping in a botched plan to throw off law enforcement investigators.

In November 2024, U.S. authorities charged five men aged 20 to 25 in connection with the Scattered Spider group, which has long relied on recruiting minors to carry out its most risky activities. Indeed, many of the group’s core members were recruited from online gaming platforms like Roblox and Minecraft in their early teens, and have been perfecting their social engineering tactics for years.

“There is a clear pattern that some of the most depraved threat actors first joined cybercrime gangs at an exceptionally young age,” said Allison Nixon, chief research officer at the New York based security firm Unit 221B. “Cybercriminals arrested at 15 or younger need serious intervention and monitoring to prevent a years long massive escalation.”

☐ ☆ ✇ Security – Cisco Blog

Cisco Catalyst 8300 Excels in NetSecOPEN NGFW SD-WAN Security Tests

By: Hugo Vliegen — July 10th 2025 at 12:00
Cisco Catalyst 8300 earns NetSecOPEN certification for exceptional real-world NGFW and SD-WAN performance under modern enterprise conditions.
☐ ☆ ✇ WIRED

McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’

By: Andy Greenberg — July 9th 2025 at 19:28
Basic security flaws left the personal info of tens of millions of McDonald’s job-seekers vulnerable on the “McHire” site built by AI software firm Paradox.ai.
☐ ☆ ✇ Krebs on Security

Microsoft Patch Tuesday, July 2025 Edition

By: BrianKrebs — July 9th 2025 at 00:53

Microsoft today released updates to fix at least 137 security vulnerabilities in its Windows operating systems and supported software. None of the weaknesses addressed this month are known to be actively exploited, but 14 of the flaws earned Microsoft’s most-dire “critical” rating, meaning they could be exploited to seize control over vulnerable Windows PCs with little or no help from users.

While not listed as critical, CVE-2025-49719 is a publicly disclosed information disclosure vulnerability, with all versions as far back as SQL Server 2016 receiving patches. Microsoft rates CVE-2025-49719 as less likely to be exploited, but the availability of proof-of-concept code for this flaw means its patch should probably be a priority for affected enterprises.

Mike Walters, co-founder of Action1, said CVE-2025-49719 can be exploited without authentication, and that many third-party applications depend on SQL server and the affected drivers — potentially introducing a supply-chain risk that extends beyond direct SQL Server users.

“The potential exposure of sensitive information makes this a high-priority concern for organizations handling valuable or regulated data,” Walters said. “The comprehensive nature of the affected versions, spanning multiple SQL Server releases from 2016 through 2022, indicates a fundamental issue in how SQL Server handles memory management and input validation.”

Adam Barnett at Rapid7 notes that today is the end of the road for SQL Server 2012, meaning there will be no future security patches even for critical vulnerabilities, even if you’re willing to pay Microsoft for the privilege.

Barnett also called attention to CVE-2025-47981, a vulnerability with a CVSS score of 9.8 (10 being the worst), a remote code execution bug in the way Windows servers and clients negotiate to discover mutually supported authentication mechanisms. This pre-authentication vulnerability affects any Windows client machine running Windows 10 1607 or above, and all current versions of Windows Server. Microsoft considers it more likely that attackers will exploit this flaw.

Microsoft also patched at least four critical, remote code execution flaws in Office (CVE-2025-49695, CVE-2025-49696, CVE-2025-49697, CVE-2025-49702). The first two are both rated by Microsoft as having a higher likelihood of exploitation, do not require user interaction, and can be triggered through the Preview Pane.

Two more high severity bugs include CVE-2025-49740 (CVSS 8.8) and CVE-2025-47178 (CVSS 8.0); the former is a weakness that could allow malicious files to bypass screening by Microsoft Defender SmartScreen, a built-in feature of Windows that tries to block untrusted downloads and malicious sites.

CVE-2025-47178 involves a remote code execution flaw in Microsoft Configuration Manager, an enterprise tool for managing, deploying, and securing computers, servers, and devices across a network. Ben Hopkins at Immersive said this bug requires very low privileges to exploit, and that it is possible for a user or attacker with a read-only access role to exploit it.

“Exploiting this vulnerability allows an attacker to execute arbitrary SQL queries as the privileged SMS service account in Microsoft Configuration Manager,” Hopkins said. “This access can be used to manipulate deployments, push malicious software or scripts to all managed devices, alter configurations, steal sensitive data, and potentially escalate to full operating system code execution across the enterprise, giving the attacker broad control over the entire IT environment.”

Separately, Adobe has released security updates for a broad range of software, including After Effects, Adobe Audition, Illustrator, FrameMaker, and ColdFusion.

The SANS Internet Storm Center has a breakdown of each individual patch, indexed by severity. If you’re responsible for administering a number of Windows systems, it may be worth keeping an eye on AskWoody for the lowdown on any potentially wonky updates (considering the large number of vulnerabilities and Windows components addressed this month).

If you’re a Windows home user, please consider backing up your data and/or drive before installing any patches, and drop a note in the comments if you encounter any problems with these updates.

☐ ☆ ✇ WIRED

Android May Soon Warn You About Fake Cell Towers

By: Matt Burgess — July 5th 2025 at 10:30
Plus: Iran-linked hackers threaten to release Trump campaign emails, Chinese hackers still in US telecoms networks, and an abusive deepfake website plans an expansion.
☐ ☆ ✇ WIRED

A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now

By: Matt Burgess, Lily Hay Newman — July 2nd 2025 at 17:56
The Scattered Spider hacking group has caused chaos among retailers, insurers, and airlines in recent months. Researchers warn that its flexible structure poses challenges for defense.
☐ ☆ ✇ Security – Cisco Blog

Cisco Live San Diego Case Study: Malware Upatre! (Encrypted Visibility Engine Event)

By: Aditya Sankar — July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ ☆ ✇ Security – Cisco Blog

Splunk in Action at the Cisco Live San Diego SOC

By: Jessica (Bair) Oppenheimer — July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ ☆ ✇ Security – Cisco Blog

Using AI to Battle Phishing Campaigns

By: Ryan Maclennan — July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ ☆ ✇ Security – Cisco Blog

Building an XDR Integration With Splunk Attack Analyzer

By: Ryan Maclennan — July 2nd 2025 at 12:00
Cisco XDR is an infinitely extensible platform for security integrations. Like the maturing SOCs of our customers, the event SOC team at Cisco Live San Diego 2025 built custom integrations to meet our needs. You can build your own integrations using the community resources announced at Cisco Live. It was an honor to work with […]
☐ ☆ ✇ Security – Cisco Blog

Cisco Live San Diego Case Study: Hunting Cleartext Passwords in HTTP POST Requests

By: Aditya Sankar — July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future. 
☐ ☆ ✇ WIRED

Israel Says Iran Is Hacking Security Cameras for Spying

By: Lily Hay Newman — June 21st 2025 at 10:00
Plus: Ukrainian hackers reportedly knock out a key Russian internet provider, China’s Salt Typhoon hackers claim another victim, and the UK hits 23andMe with a hefty fine over its 2023 data breach.
❌