Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories

Posted on December 11, 2025December 11, 2025 By CWS

Dec 11, 2025Ravie Lakshmanan

This week’s cyber tales present how briskly the net world can flip dangerous. Hackers are sneaking malware into film downloads, browser add-ons, and even software program updates individuals belief. Tech giants and governments are racing to plug new holes whereas arguing over privateness and management. And researchers maintain uncovering simply how a lot of our digital life remains to be large open.
The brand new Threatsday Bulletin brings all of it collectively—large hacks, quiet exploits, daring arrests, and sensible discoveries that designate the place cyber threats are headed subsequent.
It is your fast, plain-spoken have a look at the week’s greatest safety strikes earlier than they turn out to be tomorrow’s headlines.

Maritime IoT underneath siege

A brand new Mirai botnet variant dubbed Broadside has been exploiting a critical-severity vulnerability in TBK DVR (CVE-2024-3721) in assaults concentrating on the maritime logistics sector. “Not like earlier Mirai variants, Broadside employs a customized C2 protocol, a singular ‘Magic Header; signature, and a sophisticated ‘Decide, Jury, and Executioner’ module for exclusivity,” Cydome stated. “Technically, it diverges from customary Mirai by using Netlink kernel sockets for stealthy, event-driven course of monitoring (changing noisy filesystem polling), and using payload polymorphism to evade static defenses.” Particularly, it tries to keep up unique management over the host by terminating different processes that match particular path patterns, fail inside checks, or have already been labeled as hostile. Broadside extends past denial-of-service assaults, because it makes an attempt to reap system credential recordsdata (/and so on/passwd and /and so on/shadow) with an purpose to determine a strategic foothold into compromised gadgets. Mirai is a formidable botnet that has spawned a number of variants since its supply code was leaked in 2016.

LLM flaws persist indefinitely

The U.Okay. Nationwide Cyber Safety Centre stated immediate injections – which discuss with flaws in generative synthetic intelligence (GenAI) purposes that enable them to parse malicious directions to generate content material that is in any other case not doable – “won’t ever be correctly mitigated” and that it is vital to lift consciousness in regards to the class of vulnerability, in addition to designing techniques that “constrain the actions of the system, moderately than simply trying to forestall malicious content material reaching the LLM.”

VaaS crackdown nets 193 arrests

Europol’s Operational Taskforce (OTF) GRIMM has arrested 193 people and disrupted felony networks which have fueled the expansion of violence-as-a-service (VaaS). The duty pressure was launched in April 2025 to fight the risk, which includes recruiting younger, inexperienced perpetrators to commit violent acts. “These people are groomed or coerced into committing a variety of violent crimes, from acts of intimidation and torture to homicide,” Europol stated. Lots of the criminals concerned within the schemes are alleged to be members of The Com, a loosely-knit collective comprising primarily English audio system who’re concerned in cyber assaults, SIM swaps, extortion, and bodily violence.

Hack instruments seized in Poland

Polish regulation enforcement arrested three Ukrainian nationals for allegedly trying to break IT techniques within the nation utilizing specialised hacking gear after their automobile was stopped and inspected. They’ve been charged with fraud, laptop fraud, and buying laptop gear and software program tailored to commit crimes, together with harm to laptop information of explicit significance to the nation’s protection. “Officers totally searched the automobile’s inside. They discovered suspicious gadgets that would even be used to intrude with the nation’s strategic IT techniques, breaking into IT and telecommunications networks,” authorities stated. “In the course of the investigation, officers seized a spy system detector, superior Flipper hacking gear, antennas, laptops, numerous SIM playing cards, routers, moveable onerous drives, and cameras.” The three males, of ages between 39 and 43, claimed to be laptop scientists and “have been visibly nervous,” however didn’t give causes as to why they have been carrying such instruments within the first place, and pretended to not perceive what was being stated to them, officers stated.

Teen information thief caught

The Nationwide Police in Spain have arrested a suspected 19-year-old hacker in Barcelona, for allegedly stealing and trying to promote 64 million data obtained from breaches at 9 firms. The defendant is alleged to have used six on-line accounts and 5 pseudonyms to promote and promote the stolen databases. The teenager faces fees associated to involvement in cybercrime, unauthorized entry, and disclosure of personal information, and privateness violations. “The cybercriminal accessed 9 completely different firms the place he obtained thousands and thousands of personal private data that he later offered on-line,” authorities alleged. In a associated growth, Ukrainian police officers introduced the arrest of a 22-year-old cybercriminal who used a customized malware he independently created to mechanically hack consumer accounts on social networks and different platforms. The compromised accounts have been then offered on hacker boards. Many of the victims have been based mostly within the U.S. and numerous European international locations. The Bukovyn resident can also be accused of administering a bot farm with greater than 5,000 profiles in numerous social networks to be able to implement numerous shadow schemes and transactions.

Tens of millions misplaced through pretend banking apps

Russian police stated they’ve dismantled a felony enterprise that stole thousands and thousands from financial institution clients within the nation utilizing malware constructed on NFCGate, a legit open-source instrument more and more exploited by cybercriminals worldwide. To that finish, three suspects have been arrested for distributing NFC-capable malware via WhatsApp and Telegram, disguising it as software program from legit banks. Victims have been first approached through cellphone and persuaded to put in a fraudulent banking app. In the course of the pretend “authorization” course of, they have been guided to carry their financial institution card to the again of their smartphone and enter their PIN — a step that enabled the attackers to reap card credentials and withdraw funds from ATMs wherever within the nation with out the cardholder’s involvement. Preliminary losses exceed 200 million rubles (about $2.6 million).

Botnets exploit React flaw

The lately disclosed React safety flaw (React2Shell, aka CVE-2025-55182) has come underneath widespread exploitation, together with concentrating on sensible residence gadgets, based on Bitdefender. These embody sensible plugs, smartphones, NAS gadgets, surveillance techniques, routers, growth boards, and sensible TVs. These assaults have been discovered to ship Mirai and RondoDox botnet payloads. Vital probing exercise has been detected from Poland, the U.S., the Netherlands, Eire, France, Hong Kong, Singapore, China, and Panama. This means “broad world participation in opportunistic exploitation,” the corporate stated. Risk intelligence agency GreyNoise stated it noticed 362 distinctive IP addresses throughout ~80 international locations trying exploitation as of December 8, 2025. “Noticed payloads fall into distinct teams: miners, dual-platform botnets, OPSEC-masked VPN actors, and recon-only clusters,” it added.

Linux malware evades detection

Cybersecurity researchers have found a beforehand undocumented Linux backdoor named GhostPenguin. A multi-thread backdoor written in C++, it may well gather system info, together with IP tackle, gateway, OS model, hostname, and username, and ship it to a command-and-control (C&C) server throughout a registration section. “It then receives and executes instructions from the C&C server. Supported instructions enable the malware to offer a distant shell through ‘/bin/sh,’ and carry out numerous file and listing operations, together with creating, deleting, renaming, studying, and writing recordsdata, modifying file timestamps, and trying to find recordsdata by extension,” Development Micro stated. “All C&C communication happens over UDP port 53.” The invention comes as Elastic detailed a brand new syscall hooking method referred to as FlipSwitch that has been devised within the aftermath of elementary adjustments launched to the Linux kernel 6.9 to permit malware to cover its presence on contaminated hosts. “Conventional rootkit methods relied on direct syscall desk manipulation, however trendy kernels have moved to a switch-statement based mostly dispatch mechanism,” safety researcher Remco Sprooten stated. “As a substitute of modifying the syscall desk, it locates and patches particular name directions contained in the kernel’s dispatch perform. This method permits for exact and dependable hooking, and all adjustments are absolutely reverted when the module is unloaded.”

Crypto laundering plea deal

Evan Tangeman, a 22-year-old California resident, pleaded responsible to RICO conspiracy fees after being accused of shopping for houses and laundering $3.5 million on behalf of a felony gang that stole cryptocurrency via social engineering schemes. “The enterprise started no later than October 2023 and continued via at the least Could 2025. It grew from friendships developed on on-line gaming platforms and consisted of people based mostly in California, Connecticut, New York, Florida, and overseas,” the Justice Division (DoJ) stated. “Tangeman was a cash launderer for the group that additionally included database hackers, organizers, goal identifiers, callers, and residential burglars concentrating on {hardware} digital foreign money wallets.” Members of the group have been beforehand charged with stealing greater than $263 million price of cryptocurrency from a sufferer in Washington, D.C.

Spy ware warnings go world

Apple and Google have despatched a brand new spherical of adware notifications to customers in practically 80 international locations, based on a report from Reuters. There are at the moment no particulars about what sort of adware the victims have been focused with. Neither firm supplied info on the variety of customers focused or who they thought was behind the surveillance efforts.

EU greenlights Meta’s advert mannequin

The European Fee has given its stamp of approval to a Meta proposal to offer Instagram and Fb customers an choice to share much less private information and see fewer personalised adverts. The brand new possibility goes into impact in January 2026. “Meta will give customers the efficient selection between consenting to share all their information and seeing absolutely personalised promoting, and opting to share much less private information for an expertise with extra restricted personalised promoting,” the Fee stated. The transfer comes after the social media large was fined €200 million in April 2025 (then $227 million) for violating the bloc’s Digital Markets Act (DMA) over the binary selection it offers E.U. customers to both pay to entry ad-free variations of the platforms or conform to being tracked in trade for focused adverts. In a put up final week, Austrian non-profit None of Your Enterprise (noyb) revealed a survey that stated “when there is a ‘pay,’ a ‘consent,’ and an ‘promoting, however no monitoring’ possibility, […] 7 out of 10 individuals then select the ‘promoting, however no monitoring’ possibility.”

Mass alert for Lumma victims

New Zealand’s Nationwide Cyber Safety Centre (NCSC) stated it is notifying round 26,000 customers who’ve been contaminated with Lumma Stealer, in what it described as the primary large-scale public outreach. “The malicious software program is designed to steal delicate info, like e mail addresses and passwords, from gadgets usually for the needs of fraud or id theft,” it stated. “Using Lumma Stealer and different related malware by cyber criminals is an ongoing worldwide concern.”

Replace closes hijack flaw

Notepad++ has launched model 8.8.9 to repair a vital flaw within the open-source textual content and supply code editor for Home windows. This bug, based on safety researcher Kevin Beaumont, was being abused by risk actors in China to hijack visitors from WinGUp (the Notepad++ updater), redirect it to malicious servers, after which trick individuals into downloading malware. “Confirm certificates and signature on downloaded replace installer,” reads the discharge notes for model 8.8.9. “The assessment of the stories led to the identification of a weak point in the best way the updater validates the integrity and authenticity of the downloaded replace file,” Notepad++ maintainers stated. “In case an attacker is ready to intercept the community visitors between the updater shopper and the Notepad++ replace infrastructure, this weak point might be leveraged by an attacker to immediate the updater to obtain and execute an undesirable binary (as a substitute of the legit Notepad++ replace binary).”

Telegram tightens cyber controls

A brand new report from Kaspersky inspecting greater than 800 blocked Telegram channels that existed between 2021 and 2024 has revealed that the “median lifespan of a shadow Telegram channel elevated from 5 months in 2021-2022 to 9 months in 2023-2024” The messaging app additionally seems to be more and more blocking cybercrime-focused channels since October 2024, prompting risk actors emigrate to different platforms.

UK targets data warfare actors

The U.Okay. has imposed new sanctions in opposition to a number of Russian and Chinese language organizations accused of undermining the West via cyber assaults and affect operations. The actions goal two Chinese language entities, I-Quickly and the Integrity Expertise Group (aka Flax Hurricane), in addition to a Telegram channel Ryber and its co-owner, Mikhail Zvinchuk, a corporation referred to as Pravfond that is believed to be a entrance for the GRU, and the Centre for Geopolitical Experience, a Moscow-based assume tank based by Aleksandr Dugin. “I-Quickly and Integrity Tech are examples of the risk posed by the cyber business in China, which incorporates info safety firms, information brokers (that gather and promote private information), and ‘hackers for rent,'” the U.Okay. authorities stated. “A few of these firms present cyber providers to the Chinese language intelligence providers.”

Tens of millions nonetheless utilizing Log4Shell

A brand new evaluation from Sonatype has revealed that about 13% of all Log4j downloads in 2025 are vulnerable to Log4Shell. “In 2025 alone, there have been practically 300 million whole Log4j downloads,” the provision chain safety firm stated. “Of these, about 13% – roughly 40 million downloads — have been nonetheless susceptible variations. On condition that secure alternate options have been out there for practically 4 years, each a kind of susceptible downloads represents danger that would have been averted.” China, the US, India, Japan, Brazil, Germany, the UK, Canada, South Korea, and France accounted for an enormous chunk of the susceptible downloads.

India weighs fixed monitoring

The Indian authorities is reportedly reviewing a telecom business proposal to pressure smartphone companies to allow satellite tv for pc location monitoring that’s at all times activated for higher surveillance, with no possibility for customers to disable it, Reuters revealed. The concept is to get exact places when authorized requests are made to telecom companies throughout investigations, the information company added. The transfer has been opposed by Apple, Google, and Samsung. Amnesty Worldwide has referred to as the plan “deeply regarding.”

GlobalProtect scans spike

A “concentrated spike” comprising greater than 7,000 IP addresses has been noticed trying to log into Palo Alto Networks GlobalProtect portals. The exercise, which originated from infrastructure operated by 3xK GmbH, was noticed on December 2, 2025. GreyNoise stated the December wave shares three similar shopper fingerprints with a previous wave noticed between late September and mid-October. The risk intelligence agency stated it additionally recorded a surge in scanning in opposition to SonicWall SonicOS API endpoints a day later. Each the assault waves have been attributed to the identical risk actor.

Tens of millions nonetheless utilizing Log4Shell

A brand new evaluation from Sonatype has revealed that about 13% of all Log4j downloads in 2025 are vulnerable to Log4Shell. “In 2025 alone, there have been practically 300 million whole Log4j downloads,” the provision chain safety firm stated. “Of these, about 13% – roughly 40 million downloads — have been nonetheless susceptible variations. On condition that secure alternate options have been out there for practically 4 years, each a kind of susceptible downloads represents danger that would have been averted.” China, the US, India, Japan, Brazil, Germany, the UK, Canada, South Korea, and France accounted for an enormous chunk of the susceptible downloads.

India weighs fixed monitoring

The Indian authorities is reportedly reviewing a telecom business proposal to pressure smartphone companies to allow satellite tv for pc location monitoring that’s at all times activated for higher surveillance, with no possibility for customers to disable it, Reuters revealed. The concept is to get exact places when authorized requests are made to telecom companies throughout investigations, the information company added. The transfer has been opposed by Apple, Google, and Samsung. Amnesty Worldwide has referred to as the plan “deeply regarding.”

GlobalProtect scans spike

A “concentrated spike” comprising greater than 7,000 IP addresses has been noticed trying to log into Palo Alto Networks GlobalProtect portals. The exercise, which originated from infrastructure operated by 3xK GmbH, was noticed on December 2, 2025. GreyNoise stated the December wave shares three similar shopper fingerprints with a previous wave noticed between late September and mid-October. The risk intelligence agency stated it additionally recorded a surge in scanning in opposition to SonicWall SonicOS API endpoints a day later. Each the assault waves have been attributed to the identical risk actor.

Torrent hides Agent Tesla

Cybersecurity researchers have warned of a brand new marketing campaign that makes use of a pretend torrent for the Leonardo DiCaprio starrer One Battle After One other as a launchpad for a fancy an infection chain that drops Agent Tesla malware. “As a substitute of the anticipated video file, customers unknowingly obtain a compilation of PowerShell scripts and picture archives that construct right into a memory-resident command-and-control (C2) agent, also called a trojan (RAT – Distant Entry Trojan) underneath the title of Agent Tesla,” Bitdefender stated. “Such a malware is designed with a single objective: to offer attackers with unfettered entry to the sufferer’s Home windows laptop.” The assault is a part of a rising pattern of embedding malware in bogus multimedia recordsdata. Earlier this Could, a lure for Mission: Not possible – The Remaining Reckoning was used to unfold Lumma Stealer.

Leaked secrets and techniques flood Docker Hub

A brand new examine from Flare has discovered that greater than 10,000 Docker Hub container photos are exposing credentials to manufacturing techniques, CI/CD databases, or giant language mannequin (LLM) keys. “42% of uncovered photos contained 5 or extra secrets and techniques every, which means a single container might unlock a complete cloud surroundings, CI/CD pipeline, and database,” the corporate stated. “AI LLM mannequin keys have been essentially the most regularly leaked credentials, with virtually 4,000 uncovered, revealing how briskly AI adoption has outpaced safety controls.” The publicity represents extreme dangers, because it allows full entry to cloud environments, Git repositories, CI/CD techniques, fee integrations, and different core infrastructure elements.

VS Code trojans disguised as PNGs

As many as 19 Microsoft Visible Studio Code (VS Code) extensions have been recognized on the official Market, with most of them embedding a malicious file that masquerades as a PNG picture. The marketing campaign, lively since February 2025, was found final week. “The malicious recordsdata abused a legit npm bundle [path-is-absolute] to keep away from detection and crafted an archive containing malicious binaries that posed as a picture: A file with a PNG extension,” ReversingLabs researcher Petar Kirhmajer stated. “For this newest marketing campaign, the risk actor modified it by including a couple of malicious recordsdata. Nevertheless, it is vital to notice that these adjustments to the bundle are solely out there when it’s put in regionally via the 19 malicious extensions, and they aren’t really a part of the bundle hosted on npm.” The online impact is that the weaponized bundle is used to launch the assault as quickly as one of many malicious extensions is used and VS Code is launched. The principle objective of the malicious code is to decode what seems to be a PNG file (“banner.png”), however, in actuality, is an archive containing two binaries which are executed utilizing the “cmstp.exe” living-off-the-land binary (LOLBin) by way of a JavaScript dropper. “One in all these binaries is accountable for closing the LOLBin by emulating a key press, whereas the opposite binary is a extra sophisticated Rust trojan,” ReversingLabs stated. The extensions have since been eliminated by Microsoft from the Market.

ValleyRAT builder dissected

Examine Level Analysis stated it was in a position to reverse engineer the ValleyRAT (aka Winos or Winos4.0) backdoor and its plugins by inspecting a publicly leaked builder and its growth construction. “The evaluation reveals the superior abilities of the builders behind ValleyRAT, demonstrating deep information of Home windows kernel and user-mode internals, and constant coding patterns suggesting a small, specialised staff,” the cybersecurity firm stated. “The ‘Driver Plugin’ comprises an embedded kernel-mode rootkit that, in some circumstances, retains legitimate signatures and stays loadable on absolutely up to date Home windows 11 techniques, bypassing built-in safety options.” Particularly, the plugin facilitates stealthy driver set up, user-mode shellcode injection through APCs, and forceful deletion of AV/EDR drivers. The rootkit relies on the publicly out there open-source mission Hidden. One of many different plugins is a login module that’s designed to load further elements from an exterior server. ValleyRAT is attributed to a Chinese language cybercrime group often known as Silver Fox. Roughly 6,000 ValleyRAT-related samples have been detected within the wild between November 2024 and November 2025, along with 30 distinct variants of the ValleyRAT builder and 12 variants of the rootkit driver.

AI chat guides unfold stealers

In a brand new marketing campaign, risk actors are abusing the flexibility to share chats on OpenAI ChatGPT and Grok to floor them in search outcomes, both through malvertising or SEO (website positioning) poisoning, to trick customers into putting in stealers like AMOS Stealer when trying to find “sound not engaged on macOS,” “clear disk area on macOS,” or ChatGPT Atlas on serps like Google. The chat periods are shared underneath the guise of troubleshooting or set up guides and embody ClickFix-style directions to launch the terminal and paste a command to handle points confronted by the consumer. “Attackers are systematically weaponizing a number of AI platforms with website positioning poisoning, and that it’s not remoted to a single AI platform, web page, or question, guaranteeing victims encounter poisoned directions no matter which instrument they belief,” Huntress stated. “As a substitute, a number of AI-style conversations are being surfaced organically via customary search phrases, every pointing victims towards the identical multi-stage macOS stealer.” The event comes as platforms like itch.io and Patreon are being utilized by risk actors to distribute Lumma Stealer. “Newly created Itch.io accounts spam feedback in several legit video games, with templated textual content messages that present Patreon hyperlinks to supposed sport updates,” G DATA stated. These hyperlinks direct to ZIP archives containing a malicious executable that is compiled with nexe and runs a six-levels of anti-analysis checks earlier than dropping the stealer malware.

Cybersecurity is not only a tech concern anymore—it is a part of every day life. The identical instruments that make work and communication simpler are those attackers now use to slide in unnoticed. Each alert, patch, or coverage shift connects to a much bigger story about how fragile digital belief has turn out to be.
As threats maintain evolving, staying conscious is the one actual protection. The Threatsday Bulletin exists for that motive—to chop via the noise and present what really issues in cybersecurity proper now. Learn on for this week’s full rundown of breaches, discoveries, and selections shaping the digital world.

The Hacker News Tags:Alerts, Docker, Leaks, Mirai, Rootkit, Spyware, Stories, Strikes, ValleyRAT

Post navigation

Previous Post: NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
Next Post: MITRE Posts Results of 2025 ATT&CK Enterprise Evaluations

Related Posts

Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks The Hacker News
Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering The Hacker News
Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution The Hacker News
Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities The Hacker News
CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation The Hacker News
How Attackers Bypass Synced Passkeys The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark