Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent

Posted on November 2, 2025November 2, 2025 By CWS

This week’s cybersecurity roundup highlights escalating threats from misconfigurations, software program flaws, and superior malware. Key incidents demand rapid consideration from IT groups and executives.

ISC patched CVE-2025-5470 in BIND 9 (variations 9.16.0–9.18.26), a DoS vulnerability (CVSS 8.6) permitting server crashes by malformed DNS queries. It dangers amplification assaults on world infrastructure—replace DNS servers urgently.

Google fastened CVE-2025-5482, a Chrome V8 engine zero-day (under 131.0.6778.76) enabling sandbox escapes and code execution by way of malicious websites. Exploited within the wild throughout platforms, auto-updates are rolling out to counter phishing threats.

The Aardvark Agent backdoor, tied to state actors, targets finance by way of spear-phishing. Mimicking admin instruments, it facilitates exfiltration and motion; IOCs embody particular C2 domains. Bolster endpoint detection and zero-trust fashions.

Threats

Android Banking Trojan Herodotus Evades Detection

A brand new Android malware known as Herodotus has surfaced, performing as a complicated banking trojan that mimics human typing patterns to bypass behavioral biometrics throughout distant management periods. Distributed by way of side-loading and SMiShing, it makes use of a customized dropper to avoid Android 13+ restrictions on Accessibility Companies, deploying overlays for credential harvesting and SMS interception. Focusing on customers in Italy and Brazil as Malware-as-a-Service, Herodotus splits textual content enter into characters with randomized 300-3000ms delays, simulating pure keystrokes to keep away from anti-fraud alerts.​

Learn extra:

Stealthy Atroposia RAT Allows Hidden Entry

Atroposia, a modular distant entry trojan priced at $200 month-to-month, lowers limitations for cybercriminals by bundling options like hidden distant desktop, credential theft, and vulnerability scanning in an intuitive panel. Its HRDP Join creates invisible shadow periods for undetected system interplay, permitting surveillance and information exfiltration with out consumer notifications or commonplace RDP logs. With privilege escalation, persistence throughout reboots, and a file grabber for in-memory extraction, Atroposia blends into programs to evade antivirus and DLP instruments.​

Learn extra:

Gunra Ransomware Hits Twin Platforms

Gunra ransomware, energetic since April 2025, targets Home windows and Linux programs utilizing twin encryption strategies and double-extortion techniques to encrypt information and threaten information leaks by way of a Tor web site. It appends .ENCRT extensions to information, drops R3ADM3.txt ransom notes, deletes shadow copies by way of WMI, and employs anti-debugging like IsDebuggerPresent to evade evaluation. Based mostly on Conti, Gunra impacts industries like actual property and prescription drugs globally, with victims in Japan, Egypt, and Italy urged to pay inside 5 days or face publication.​

Learn extra:

Gents’s RaaS Recruits Associates

The Gents’s RaaS, marketed on hacking boards by operator zeta88, affords cross-platform encryption for Home windows, Linux, and ESXi programs utilizing Go and C code, with a 90% affiliate income share. This favorable mannequin attracts skilled actors by granting full negotiation management whereas dealing with backend operations, increasing ransomware’s attain to enterprise infrastructures like NAS and digital environments. The small 32KB ESXi locker emphasizes stealth, marking an evolution in RaaS commercialization past conventional platforms.​

Learn extra:

PolarEdge Botnet Expands IoT Management

The PolarEdge botnet has contaminated over 25,000 IoT units throughout 40 international locations, constructing 140 C2 servers by exploiting vulnerabilities in units like Cisco routers, Asus, and KT CCTV programs. Disclosed in February 2025, it creates an Operational Relay Field community for APT actors, offering nameless proxying by way of multi-hop structure and ports 55555/55560 for site visitors and instructions. Concentrated in South Korea (42%) and China (20%), the botnet makes use of VPS on Alibaba and Tencent Cloud for infrastructure-as-a-service in DDoS, exfiltration, and different assaults.​

Learn extra:

PhantomRaven Targets npm Builders

PhantomRaven marketing campaign deploys 126 malicious npm packages since August 2025, garnering 86,000 downloads by hiding code in dependencies fetched from attacker-controlled URLs like packages.storeartifact.com, evading scanners. These slopsquatted packages steal npm tokens, GitHub credentials, and CI/CD secrets and techniques, utilizing apparent writer names like npmhell for operational traceability. Initially 21 packages eliminated, attackers tailored for 80 extra, enabling tailor-made malware supply and provide chain compromises in JavaScript tasks.​

Learn extra:

Faux ChatGPT Apps Allow Surveillance

Malicious apps impersonating ChatGPT on third-party shops request broad permissions for SMS, contacts, and logs, utilizing Ijiami obfuscation and native libraries for persistent keylogging and credential theft. They exfiltrate OTPs, banking codes, and deal with books by way of area fronting on AWS and Google Cloud, mimicking reputable AI interfaces to mix site visitors. Resembling Triout and AndroRAT spy ware, these trojans exploit AI hype for surveillance, urging customers to stay to official OpenAI sources.​

Learn extra:

Cyberattacks

New Phishing Assault Utilizing Invisible Characters

Cybercriminals are using MIME encoding and Unicode gentle hyphens in e-mail topic traces to bypass safety filters, fragmenting key phrases like “password” whereas showing regular to customers. This method targets credential theft by way of pretend webmail pages and has been noticed in campaigns directing victims to compromised domains. The strategy extends to message our bodies, evading content material scanners and highlighting gaps in keyword-based detection.​Learn extra:

10 Malicious npm Packages with Auto-Run Function

Ten typosquatted npm packages mimicking libraries like discord.js have contaminated over 9,900 developer environments by executing by way of postinstall hooks throughout Home windows, Linux, and macOS. These packages deploy multi-stage credential harvesters utilizing obfuscation layers, pretend CAPTCHAs, and PyInstaller binaries to steal browser information, SSH keys, and cloud credentials. The malware exfiltrates information to attacker servers, enabling account takeovers in company and cloud programs.​Learn extra:

Menace Actors Weaponize Judicial Paperwork

Menace actors are impersonating Colombia’s Lawyer Basic’s workplace in phishing emails with SVG attachments that result in ZIP information containing Hijackloader malware, finally deploying the PureHVNC RAT. This marketing campaign targets Latin American customers with judicial-themed lures, utilizing DLL side-loading and evasion techniques like stack spoofing to ascertain persistence. The shift to PureHVNC supply marks an evolution in regional assaults, exploiting belief in authorized communications.​Learn extra:

CISA Shares Menace Detections for WSUS Vulnerability

CISA has up to date steerage on detecting exploitation of CVE-2025-59287, a vital RCE flaw in Home windows Server Replace Companies affecting variations from 2012 to 2025. Attackers use crafted SOAP requests for deserialization-based code execution with SYSTEM privileges, enabling credential theft and lateral motion by way of proxies. Organizations ought to apply the October 23 out-of-band patch, monitor for anomalous wsusservice.exe processes, and block ports 8530/8531 as mitigations.​Learn extra:

12 Malicious Extensions in VSCode Market

Safety researchers recognized 12 malicious VSCode extensions within the market and OpenVSX, with 4 nonetheless energetic, stealing supply code, credentials, and enabling backdoors regardless of 613 million suspicious downloads total. These extensions use hid operations like unauthorized downloads and community scans, exploiting the IDE’s privileges for provide chain assaults. The ecosystem’s 5.6% suspicious price highlights dangers in AI-assisted improvement instruments.​Learn extra:

RediShell RCE Vulnerability Exposes 8500 Redis Situations

CVE-2025-49844, a use-after-free flaw in Redis’s Lua scripting engine, permits sandbox escape and host-level RCE on over 8,500 uncovered cases, many with out authentication in cloud environments. Attackers craft malicious Lua scripts to execute arbitrary instructions, risking malware set up and information exfiltration for the reason that flaw dates again to 2012. Redis has patched the vulnerability, urging rapid updates for all variations with Lua enabled.​Learn extra:

New Lampion Stealer Makes use of ClickFix Assault

Brazilian menace actors behind the Lampion banking trojan have adopted ClickFix lures in phishing campaigns, tricking customers into working PowerShell instructions that obtain obfuscated VBScripts for multi-stage infections concentrating on Portuguese banks. The malware evades detection by dispersed execution, anti-analysis checks, and persistence by way of startup folders, stealing banking credentials since its 2019 debut. This evolution consists of ZIP attachments and scheduled restarts to keep up stealth throughout authorities and monetary sectors.​Learn extra:

Cisco IOS XE BadCandy Net Shell

Attackers exploit CVE-2023-20198 in unpatched Cisco IOS XE units to deploy the BadCandy Lua-based net shell, creating privileged accounts for command execution by way of hidden Nginx endpoints. Noticed in over 400 Australian compromises since July 2025, the non-persistent implant hides by way of non permanent patches however allows persistence by stolen credentials. Mitigation requires making use of Cisco’s October 2023 patch, disabling HTTP servers, and monitoring for unauthorized customers and config modifications.​Learn extra:

​Vulnerabilities​

Magento SessionReaper Vulnerability

A vital enter validation flaw in Adobe Commerce (previously Magento), tracked as CVE-2025-54236, allows attackers to hijack consumer periods and execute distant code with out authentication, affecting unpatched variations with a CVSS rating of 9.8. Found on September 9, 2025, the vulnerability surged in exploitation after a proof-of-concept launch on October 22, compromising over 250 shops with net shells and reconnaissance instruments. Mitigation entails rapid patching from Adobe and deploying net utility firewalls like Akamai’s to dam PHP uploads and injection makes an attempt.​

Learn extra:

BIND 9 DNS Cache Poisoning Flaw

CVE-2025-40778 in BIND 9 permits unauthenticated attackers to forge DNS information and poison caches, bypassing protections like randomized question IDs, impacting recursive resolvers from variations 9.11.0 to 9.21.12 with a CVSS rating of 8.6. Disclosed by ISC on October 22, 2025, the flaw allows site visitors redirection for phishing or malware distribution, with no recognized wild exploitation but however a public proof-of-concept growing dangers. Patched variations embody 9.18.41, 9.20.15, and 9.21.14; directors ought to allow DNSSEC and disable recursive queries on authoritative servers.​

Learn extra:

HikvisionExploiter Toolkit Targets IP Cameras

The open-source HikvisionExploiter device automates assaults on weak Hikvision cameras, exploiting CVE-2021-36260 for command injection and credential extraction on firmware earlier than V5.5.0, affecting fashions like DS-2CD collection with CVSS 9.8. Launched in 2024 however energetic in 2025, it captures snapshots by way of unauthenticated endpoints, decrypts configs with AES/XOR, and helps multithreaded scans for hundreds of targets. CISA-listed for real-world abuse, it allows surveillance hijacking; replace to V5.7.0+, phase networks, and scan with instruments like Shodan.​

Learn extra:

TEE.Fail Aspect-Channel Assault on DDR5

The TEE.Fail assault exposes vulnerabilities in Intel SGX/TDX and AMD SEV-SNP trusted execution environments by interposing on DDR5 reminiscence buses to extract enclave secrets and techniques by way of deterministic ciphertext patterns, requiring bodily entry. Disclosed in late October 2025, it undermines {hardware} encryption in information facilities for keys or AI fashions with out software program flaws. Distributors advise enhanced bodily safety and cryptographic randomization; no distant exploitation attainable, however insiders pose dangers.​

Learn extra:

Chrome 142 Patches 20 Vulnerabilities

Google launched Chrome 142 on October 28, 2025, fixing 20 flaws together with high-severity V8 JavaScript points like kind confusion (CVE-2025-12428) and race situations enabling distant code execution, plus use-after-free and coverage bypasses in extensions. Affecting Home windows, Mac, Linux, Android, and ChromeOS, the replace consists of Omnibox UI fixes to forestall phishing. Allow auto-updates instantly, as unpatched browsers threat malicious code execution.​

Learn extra:

Ghost SPNs Allow Kerberos Reflection

CVE-2025-58726 exploits ghost Service Principal Names in Home windows SMB servers for authentication reflection, permitting low-privilege attackers to realize SYSTEM entry by way of Kerberos ticket relaying with out SMB signing. Disclosed June 2025 and patched October 14, it makes use of DNS hijacking of unresolved SPNs and coercion instruments like PetitPotam for area escalation. Implement SMB signing, audit SPNs with setspn -D, and limit DNS writes to forestall reflection assaults.​

Learn extra:

Chromium Blink Brash Vulnerability

The Brash flaw in Chromium’s Blink engine lacks price limiting on doc.title updates, enabling attackers to flood DOM mutations and crash browsers like Chrome and Edge in 15-60 seconds by way of UI thread saturation. Disclosed October 2025 with a public PoC, it impacts all Chromium-based browsers by injecting hundreds of thousands of updates per second from malicious pages. Patch promptly and monitor for anomalous DOM exercise to keep away from denial-of-service impacts.​

Learn extra:

VMware Instruments and Aria 0-Day Exploitation

CVE-2025-41244, an area privilege escalation in VMware Instruments and Aria Operations, permits unprivileged attackers to execute root code by way of visitor service flaws, exploited as zero-day since mid-October 2024. Added to CISA’s KEV catalog in October 2025, it dangers ransomware in digital environments. Apply patches instantly, monitor for anomalies, and phase virtualized programs.​

Knowledge Leak

Tata Motors Knowledge Leak

Safety researcher Eaton Zveare disclosed vulnerabilities in Tata Motors’ programs that uncovered over 70 terabytes of delicate information, together with buyer private info, monetary experiences, and fleet administration particulars from 2023. Hardcoded AWS entry keys on public web sites just like the E-Dukaan platform allowed unauthorized entry to cloud storage buckets containing database backups, invoices with PAN numbers, and market intelligence. The FleetEdge system suffered from decryptable credentials, enabling potential malware uploads, whereas a backdoor in E-Dukaan granted passwordless entry to dashboards; points had been reported to CERT-In and remediated by January 2024 with out public notification.​

Learn extra: Tata Motors Knowledge Leak

HSBC USA Alleged Breach

A menace actor claimed on a darkish net discussion board to have breached HSBC USA, alleging possession of buyer PII like names, SSNs, addresses, and transaction histories, probably concentrating on company accounts. Screenshots confirmed current information samples, elevating issues amid HSBC’s U.S. market challenges following a DoS assault. HSBC denied the claims, stating investigations discovered the pattern not from their programs and no buyer information uncovered, with enhanced monitoring in place; consultants advise monitoring for identification theft dangers.​

Learn extra: Hackers Allegedly Declare Breach of HSBC USA

EY Knowledge Leak

A 4TB SQL Server backup file from Ernst & Younger (EY) was discovered publicly accessible on Microsoft Azure throughout a routine scan by Neo Safety. The unencrypted .BAK file probably contained database dumps with schemas, consumer information, and embedded credentials like API keys, found by way of metadata checks and DNS information linking to EY. EY remediated the difficulty rapidly after disclosure, confirming no shopper or private information impacted, because it concerned an acquired Italian entity; the incident underscores the necessity for steady cloud asset mapping towards automated threats.​

Learn extra: EY Knowledge Leak

Home windows

Home windows Narrator DLL Hijack

Researchers recognized a DLL hijacking vulnerability within the Home windows Narrator accessibility device, permitting attackers to execute malicious code with elevated privileges. The flaw stems from insecure DLL loading paths, exploitable when Narrator is launched, probably bypassing security measures in enterprise environments. Microsoft has not but patched it, however mitigation entails limiting Narrator utilization and monitoring for suspicious DLLs; this highlights ongoing dangers in built-in Home windows utilities.

Learn extra: Home windows Narrator DLL Hijack

AzureHound Enumeration Instrument

Open-source device AzureHound, a part of the BloodHound suite, is being weaponized by menace actors like Iranian group Peach Sandstorm and ransomware operators Storm-0501 to map Azure Entra ID environments remotely by way of Microsoft Graph and Azure APIs. It collects identification and useful resource information in JSON for visualization of privilege escalation paths, enabling environment friendly discovery with out inside community entry. Defenses embody monitoring API exercise for anomalies and strengthening entry controls, as misuse leaves detectable logs in cloud setups.​

Learn extra: AzureHound Enumerate Azure Entra ID

Microsoft 365 Copilot Researcher

Microsoft launched “Researcher with Pc Use” in 365 Copilot, an AI characteristic that autonomously browses web sites, accesses authenticated content material, and performs duties like creating displays in a sandboxed digital machine. Working by way of visible and textual content browsers on Home windows 365, it integrates work information with consumer controls and security classifiers to forestall injections, bettering analysis effectivity by 44% on benchmarks. Safety measures embody auditable actions, no credential sharing, and admin controls for area lists, addressing dangers in autonomous AI whereas enhancing productiveness.

Learn extra: Microsoft 365 Copilot Researcher

WSUS Vulnerability Exploited

A vital vulnerability in Home windows Server Replace Companies (WSUS) is below energetic exploitation, permitting distant code execution on area controllers by way of manipulated replace approvals. Attackers can chain it with different flaws for persistence in enterprise networks, concentrating on unpatched programs in hybrid environments. Microsoft urges rapid patching and configuration hardening, with indicators together with uncommon WSUS site visitors; this exploit amplifies provide chain dangers in replace mechanisms.

Learn extra: WSUS Vulnerability Actively Exploited

Different Information

Google Unveils Information for Defenders

Google’s Mandiant division launched a complete information to watch and safe privileged accounts, addressing credential theft that contributed to 16% of 2024 intrusions. The framework emphasizes prevention by entry tiering, detection by way of behavioral analytics, and fast response techniques like credential rotations, positioning privileged entry administration as important for cloud environments. It advocates for multifactor authentication, just-in-time administration, and instruments like CyberArk to scale back dwell occasions, which averaged 11 days in breaches.

Learn extra:

Microsoft DNS Outage Disrupts Companies

A DNS-related outage struck Microsoft on October 29, 2025, impacting Azure and Microsoft 365 entry worldwide, with customers going through authentication failures and delays in portals like Alternate admin middle. The difficulty, stemming from inside infrastructure connectivity issues, affected tens of hundreds, together with healthcare and transportation sectors, highlighting DNS vulnerabilities in cloud ecosystems. Microsoft mitigated by rerouting site visitors and suggested programmatic entry throughout restoration, marking it as an remoted incident with out cyberattack involvement.

Learn extra:

AWS US East-1 Area Faces Delays

Amazon Net Companies reported elevated latencies in its US East-1 area on October 28, 2025, primarily affecting EC2 occasion launches and cascading to container companies like ECS. The disruption created operational hurdles for companies reliant on the area’s high-traffic infrastructure, emphasizing the interconnected dangers in cloud platforms. AWS resolved the difficulty by site visitors redistribution, nevertheless it served as a reminder for diversified deployments and enhanced monitoring to keep up resilience.

Learn extra:

CISA Points Alternate Server Hardening Information

The Cybersecurity and Infrastructure Safety Company, alongside NSA and worldwide companions, printed greatest practices for securing on-premises Microsoft Alternate servers in October 2025, amid persistent exploits of end-of-life variations. The information recommends limiting admin entry, enabling multifactor authentication, and configuring TLS with prolonged safety to counter threats like adversary-in-the-middle assaults. It stresses proactive measures, together with DKIM for e-mail and zero-trust fashions, to guard communications from compromise.

Learn extra:

WhatsApp Rolls Out Passkey Encryption

WhatsApp launched passkey-based end-to-end encryption for chat backups, permitting customers to safe message histories with biometrics or machine locks as an alternative of complicated passwords. Rolled out beginning late October 2025, the characteristic simplifies safety towards information loss on new units, enhancing privateness for end-to-end encrypted content material. Customers can allow it by way of settings, making certain solely they decrypt backups saved on cloud companies.

Learn extra:

OpenAI Launches Aardvark GPT-5 Agent

OpenAI debuted Aardvark, a GPT-5-powered autonomous agent on October 29, 2025, to detect, validate, and patch software program vulnerabilities in code repositories. Working in a multi-stage pipeline, it generates menace fashions, scans commits, assessments exploits in sandboxes, and proposes fixes by way of pull requests, addressing over 40,000 CVEs reported in 2024. At present in personal beta, it goals to scale safety evaluation for builders with out workflow disruptions.

Learn extra:

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Aardvar, Agent, BIND, Chrome, Cybersecurity, Data, Leak, News, Newsletter, Vulnerability, Weekly

Post navigation

Previous Post: New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files

Related Posts

PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code Cyber Security News
GPT-5 Jailbreaked With Echo Chamber and Storytelling Attacks Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
Securing Cloud Infrastructure – AWS, Azure, and GCP Best Practices Cyber Security News
New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent
  • New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files
  • OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent
  • New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files
  • OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News