Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More

Posted on December 1, 2025December 1, 2025 By CWS

Dec 01, 2025Ravie LakshmananHacking Information / Cybersecurity

Hackers aren’t kicking down the door anymore. They simply use the identical instruments we use day-after-day — code packages, cloud accounts, electronic mail, chat, telephones, and “trusted” companions — and switch them towards us.
One unhealthy obtain can leak your keys. One weak vendor can expose many shoppers directly. One visitor invite, one hyperlink on a telephone, one bug in a standard device, and immediately your mail, chats, repos, and servers are in play.
Each story beneath is a reminder that your “secure” instruments is likely to be the actual weak spot.
⚡ Risk of the Week
Shai-Hulud Returns with Extra Aggression — The npm registry was focused a second time by a self-replicating worm that glided by the moniker “Sha1-Hulud: The Second Coming,” affecting over 800 packages and 27,000 GitHub repositories. Like within the earlier iteration, the principle goal was to steal delicate knowledge like API keys, cloud credentials, and npm and GitHub authentication info, and facilitate deeper provide chain compromise in a worm-like trend. The malware additionally created GitHub Actions workflows that enable for command-and-control (C2) and injected GitHub Actions workflow mechanisms to steal repository secrets and techniques. Moreover, the malware backdoored each npm bundle maintained by the sufferer, republishing them with malicious payloads that run throughout bundle set up. “Relatively than relying solely on Node.js, which is extra closely monitored, the malware dynamically installs Bun throughout bundle set up, benefiting from its excessive efficiency and self-contained structure to execute massive payloads with improved stealth,” Endor Labs mentioned. “This shift probably helps the malware evade conventional defenses tuned particularly to look at Node.js conduct.” GitGuardian’s evaluation revealed a complete of 294,842 secret occurrences, which correspond to 33,185 distinctive secrets and techniques. Of those, 3,760 have been legitimate as of November 27, 2025. These included GitHub entry tokens, Slack webhook URLs, GitHub OAuth tokens, AWS IAM keys, OpenAI Challenge API keys, Slack bot tokens, Claude API keys, Google API Keys, and GitLab tokens. Set off.dev, which had certainly one of its engineers putting in a compromised bundle on their improvement machine, mentioned the incident led to credential theft and unauthorized entry to its GitHub group. The Python Package deal Index (PyPI) repository mentioned it was not impacted by the availability chain incident.

🔔 Prime Information

ToddyCat Steals Outlook Emails and Microsoft 365 Entry Tokens — Attackers behind the ToddyCat superior persistent menace (APT) toolkit have advanced to stealing Outlook mail knowledge and Microsoft 365 Entry tokens. The APT group has refined its toolkit in late 2024 and early 2025 to seize not solely browser credentials, as beforehand seen, but in addition victims’ precise electronic mail archives and entry tokens. The exercise marks the second main shift in ToddyCat’s tooling this 12 months, following an April 2025 marketing campaign the place the group abused a vulnerability in ESET’s safety scanner to ship a beforehand undocumented malware codenamed TCESB.
Qilin Assault Breaches MSP to Hack into Dozens of Monetary Corporations — South Korea’s monetary sector has been focused by what has been described as a classy provide chain assault that led to the deployment of Qilin ransomware. “This operation mixed the capabilities of a serious Ransomware-as-a-Service (RaaS) group, Qilin, with potential involvement from North Korean state-affiliated actors (Moonstone Sleet), leveraging Managed Service Supplier (MSP) compromise because the preliminary entry vector,” Bitdefender mentioned. Korean Leaks happened over three publication waves, ensuing within the theft of over 1 million information and a pair of TB of knowledge from 28 victims. To tug off these assaults, the Qilin affiliate is alleged to have breached a single upstream managed service supplier (MSP), leveraging the entry to compromise a number of victims directly.
CISA Warns of Adware Campaigns Utilizing Adware and RATs — The U.S. Cybersecurity and Infrastructure Safety Company (CISA) issued an alert warning of unhealthy actors actively leveraging business spy ware and distant entry trojans (RATs) to focus on customers of cellular messaging functions. The cyber actors use social engineering methods to ship spy ware and achieve unauthorized entry to a sufferer’s messaging app, facilitating the deployment of further malicious payloads that may additional compromise the sufferer’s cellular gadget, the company mentioned. The exercise focuses on high-value people, primarily present and former high-ranking authorities, army, and political officers, together with civil society organizations and people throughout the USA, the Center East, and Europe.
Assault Exploits WSUS Flaw to Deploy ShadowPad — Unknown menace actors exploited a not too long ago patched safety flaw in Microsoft Home windows Server Replace Companies (CVE-2025-59287) to distribute malware often known as ShadowPad. The attackers have been discovered to weaponize the vulnerability to launch Home windows utilities like “curl.exe” and “certutil.exe,” to contact an exterior server (“149.28.78[.]189:42306”) to obtain and set up ShadowPad. It is not clear who’s behind the assault, however ShadowPad is a privately bought malware broadly shared by Chinese language hacking teams.
A Blindspot in Microsoft Groups Visitor Entry — Cybersecurity researchers make clear a “basic architectural hole” that permits attackers to bypass Microsoft Defender for Workplace 365 protections by way of the visitor entry characteristic in Groups. The difficulty is basically that when customers function as company in one other tenant, their protections are decided completely by that internet hosting surroundings, not by their residence group. Microsoft started rolling out visitor entry final month. “These developments improve collaboration alternatives, however additionally they widen the duty for making certain these exterior environments are reliable and correctly secured,” Ontinue mentioned.

‎️‍🔥 Trending CVEs
Hackers act quick. They’ll use new bugs inside hours. One missed replace could cause an enormous breach. Listed below are this week’s most critical safety flaws. Examine them, repair what issues first, and keep protected.
This week’s record consists of — CVE-2025-12972, CVE-2025-12970, CVE-2025-12978, CVE-2025-12977, CVE-2025-12969 (Fluent Bit), CVE-2025-13207, CVE-2024-24481 (Tenda), CVE-2025-62164 (vLLM), CVE-2025-12816 (Forge), CVE-2025-59373 (ASUS MyASUS), CVE-2025-59366 (ASUS routers) CVE-2025-65998 (Apache Syncope), CVE-2025-13357 (HashiCorp Vault Terraform Supplier), CVE-2025-33183, CVE-2025-33184 (NVIDIA Isaac-GR00T), CVE-2025-33187 (NVIDIA DGX Spark), CVE-2025-12571, CVE-2024-9183 (GitLab CE/EE), CVE-2025-66035 (Angular HttpClient), and an unauthenticated DoS vulnerability in Subsequent.js (no CVE).

📰 Across the Cyber World

Poland Detains Russian Citizen Over Hack — Polish authorities detained a Russian citizen suspected of hacking into the IT programs of native firms, marking the newest case that Warsaw has linked to Moscow’s sabotage and espionage efforts. The suspect allegedly broke into a web based retailer’s programs with out authorization and tampered with its databases in order to doubtlessly disrupt operations. The id of the suspect has not been disclosed.
FCC Urges Broadcasters to Guarantee Safety of Networks — The U.S. Federal Communications Fee (FCC) has urged broadcasters to make sure the safety of their broadcast networks and programs in response to a latest string of cyber assaults that led to the published of obscene supplies and the misuse of the Emergency Alert System (EAS) Consideration Sign (Consideration Sign). “It seems that these latest hacks have been brought on by a compromised studio-transmitter hyperlink (STL) – the published gear that carries program content material from the studio to distant transmitters – with menace actors usually accessing improperly secured Barix gear and reconfiguring it to obtain attacker-controlled audio in lieu of station programming,” the FCC mentioned. “Affected stations broadcast to the general public an attacker-inserted audio stream that features an precise or simulated Consideration Sign and EAS alert tones, in addition to obscene language, and different inappropriate materials.”
Firefox WebAssembly Flaw Detailed — AISLE printed technical particulars on CVE-2025-13016 (CVSS rating: 7.5), a high-severity vulnerability in Firefox’s WebAssembly engine that might result in distant code execution. “A single line of template code, mixing uint8_t* and uint16_t* pointers in a std::copy operation created a reminiscence corruption vulnerability that might enable attackers to execute arbitrary code,” safety researcher Stanislav Fort mentioned. The weak code was launched to the browser in April 2025, however remained unnoticed till October. It was patched in Firefox 145.
New Operation Shuts Down Cryptomixer — Europol, alongside authorities from Switzerland and Germany, shut down a hybrid cryptocurrency mixing service often known as Cryptomixer, which is suspected of facilitating cybercrime and cash laundering. The operation happened between November 24 and 28, 2025. The trouble additionally led to over 12 terabytes of knowledge and greater than €25 million ($29.05 million) price of Bitcoin. Since its creation in 2016, over €1.3 billion in Bitcoin is estimated to have been combined via the service. “It facilitated the obfuscation of legal funds for ransomware teams, underground economic system boards, and darkish internet markets,” Europol mentioned. “It is software program blocked the traceability of funds on the blockchain, making it the platform of selection for cybercriminals in search of to launder unlawful proceeds from quite a lot of legal actions, reminiscent of drug trafficking, weapons trafficking, ransomware assaults, and cost card fraud.” The event got here as Dutch police officers seized 250 servers linked to an unnamed bulletproof internet hosting supplier on November 12, 2025.
South Korea Sentenced Man to 1 Yr in Jail for Shopping for Hacking Instruments From North Korea — A 39-year-old businessman, known as Mr. Oh, was sentenced to 1 12 months in jail for repeatedly contacting a North Korean hacker named Eric by way of the QQ messenger and buying hacking packages to neutralize safety software program for working unlawful non-public servers for Lineage, The Chosun Every day reported.
AI Firm Spots Fraud Marketing campaign — Synthetic intelligence (AI)-driven agentic coding platform Manufacturing facility mentioned it disrupted a extremely automated cyber operation abusing its free tiers to automate cyber assaults utilizing its Droid AI improvement agent. “The aim of this assault was to take advantage of free compute at scale by chaining collectively free utilization from a number of AI merchandise and reselling that entry and utilizing it to masks a broad vary of exercise, together with cyber crime,” the corporate mentioned. “The infrastructure supported automated creation of accounts and organizations throughout a number of suppliers, redemption of trials and promotions as quickly as they turned accessible, well being checking and key rotation when a supplier banned or throttled a key, and routing logic that might shift visitors away from Droid second‑to‑second as our defenses tightened.” The assault was carried out by a big, China‑based mostly operation, it added, stating at the least one state‑linked actor was concerned.
Pretend Battlefield 6 Recreation Used to Ship Stealers and C2 Brokers — Risk actors are capitalizing on the recognition of Digital Arts’ Battlefield 6 recreation to distribute pirated variations, recreation installers, and faux recreation trainers throughout torrent web sites that deploy stealers and C2 brokers. One of many payloads, as soon as executed, steals Discord credentials, cryptocurrency pockets, and cookies from Chrome, Edge, Firefox, Opera, Courageous, Vivaldi, and Wave Browser. One other stealer malware, distributed as “Battlefield 6.GOG-InsaneRamZes,” incorporates evasive options that cease execution if it finds that it is being run in a sandboxed surroundings or in a pc that geolocates to Russia or Commonwealth of Unbiased States (CIS) nations.
Nation-State Risk Actors Start to Collaborate — Cooperation inside nationwide state-sponsored ecosystems has turn out to be more and more widespread, Gen Digital mentioned, with overlaps in infrastructure (216.219.87[.]41) noticed between North Korean menace actors, Lazarus Group’s Contagious Interview, and Kimsuky. The cybersecurity firm additionally mentioned it recognized a DoNot Staff-attributed payload executing a recognized SideWinder loader in an assault focusing on a sufferer positioned in Pakistan. However in a extra attention-grabbing twist, an IP tackle beforehand utilized by Gamaredon as C2 was flagged as internet hosting an obfuscated model of InvisibleFerret, a Python backdoor linked to the Contagious Interview marketing campaign. “Whereas the IP might characterize a proxy or VPN endpoint, the temporal proximity of each teams’ exercise and the shared internet hosting sample point out possible infrastructure reuse, with reasonable confidence of operational collaboration,” it mentioned. “Whether or not Lazarus leveraged a Gamaredon-controlled server or each actors shared the identical consumer occasion stays unclear, however the overlap is just too near ignore.”
Anthropic Says Claude Opus is Extra Strong Towards Immediate Injections — AI firm Anthropic, which launched its coding mannequin Claude Opus 4.5 final week, mentioned it has substantial progress in robustness towards immediate injection assaults that purpose to smuggle in misleading directions to idiot the mannequin into dangerous conduct. “Opus 4.5 is tougher to trick with immediate injection than every other frontier mannequin within the business,” it mentioned, beating Claude Haiku 4.5, OpenAI GPT-5.1, and Google Gemini 3 Professional. Anthropic mentioned it added new exterior and inner evaluations for malicious makes use of and immediate injection assaults associated to coding, laptop use, and browser use environments, discovering that Opus 4.5 refused 100% of the 150 malicious coding requests in an agentic coding analysis. When examined to see whether or not it will adjust to “malware creation, writing code for harmful DDoS assaults, and creating non-consensual monitoring software program,” the mannequin refused about 78% of requests. It additionally refused simply over 88% of requests associated to surveillance, knowledge assortment, and producing and spreading dangerous content material.
Safety Flaws in Uhale Android Picture Frames — A number of important safety points and insecure behaviors have been disclosed in Uhale Android-based digital image frames that might enable attackers to take full management of the units, doubtlessly resulting in malware infections, knowledge exfiltration, botnet recruitment, lateral motion to different programs on the community, and different malicious actions. In response to Quokka researchers Ryan Johnson, Doug Bennett, and Mohamed Elsabagh, the shortcomings embody automated malware supply on boot on some units, distant code execution (RCE) flaws as a consequence of insecure belief managers and unsanitized shell execution, arbitrary file write as a consequence of unauthenticated and unsanitized file transfers, and improperly configured file suppliers, SQL injection, and use of weak cryptography. Of the 17 points, 11 have been assigned CVE identifiers. Essentially the most regarding discovering is that the Uhale app (model 4.2.0) downloads suspicious artifacts, that are then executed by a service that shares bundle prefix similarities with a malware codenamed Mzmess that is delivered by the Vo1d botnet. Uhale mentioned a majority of the failings have been fastened in model 4.2.1, with further fixes being deliberate in model 5.1.0. The present model of the app is 4.33.
Operation South Star Leverages ZipperDown in China Assaults — A now-patched vulnerability often known as ZipperDown is alleged to have been exploited within the wild by nation-state actors in assaults focusing on cellular units in China, QiAnXin mentioned. The exercise has been named Operation South Star. “The attacker sends an electronic mail containing the exploit to the goal’s cellular electronic mail utility,” it mentioned. “When the sufferer clicks on the e-mail on their telephone, ZipperDown is triggered immediately, unpacking a rigorously crafted DAT file and releasing malicious SO and APK information to overwrite the goal utility elements. Attackers exploited a logic vulnerability within the IMG picture processing of a sure electronic mail Android app model, rigorously developing a DAT file that meets the format, in the end triggering Zipperdown to overwrite the app’s associated library information.” The malicious element is designed to ascertain a shell connection and execute second-stage instructions. Latest circumstances noticed in 2024 and 2025 have leveraged the modified SO file to behave as a downloader for an APK file and cargo it. The malware, in flip, contacts a C2 server to periodically ballot for brand new instructions and execute them, permitting it to collect gadget and file info, learn information, and begin a reverse shell.
Risk Actors Proceed to Promote Malicious LLMs — Unhealthy actors have been noticed advertising malicious massive language fashions (LLMs) like WormGPT 4, KawaiiGPT, and Xanthorox which are designed to generate phishing emails, write polymorphic malware, and automate reconnaissance by expressly eradicating moral constraints and security filters throughout their foundational coaching or fine-tuning course of. A few of these instruments, like Xanthorox, are marketed for $2,500 per 12 months. Whereas the code generated by these instruments doesn’t introduce massively novel capabilities and requires further human tweaking to boost operational effectiveness for legal duties, these unrestricted fashions search to additional decrease the barrier to entry for less-skilled actors and script kiddies, thereby democratizing cybercrime. Consequently, assaults that after required sure experience in coding might be pulled off at scale inside a brief span of time by anybody with entry to the web and a primary understanding of prompts. “The road between a benign analysis device and a strong menace creation engine is dangerously skinny,” Palo Alto Networks Unit 42 mentioned. “The 2 are sometimes separated solely by the developer’s intent and the absence of moral guardrails.” Whereas safeguards constructed into the mannequin are the primary line of protection towards such assaults, an more and more widespread strategy to bypass these defenses is for attackers to say that they’re a safety researcher or collaborating in a capture-the-flag (CTF) event and wish the offensive code for his or her train. As a living proof, new analysis from Netskope Risk Labs has discovered that OpenAI’s GPT-4’s built-in safeguards may be circumvented via role-based immediate injection to generate malicious code. Merely telling the mannequin to imagine the persona of a penetration testing automation script centered on protection evasion was sufficient to create a Python script that may inject itself into svchost.exe and terminate all antivirus-related processes. Moreover, Microsoft, which is rolling out agentic AI options to Home windows 11, acknowledged that such functions introduce novel safety dangers, reminiscent of cross-prompt injection (XPIA), that can lead to knowledge exfiltration or malware set up. As menace actors more and more resort to incorporating such instruments, it is crucial that builders of basis fashions implement obligatory, strong alignment methods and adversarial stress testing earlier than public launch. “Addressing the safety challenges of AI brokers requires adherence to a robust set of safety ideas to make sure brokers act in alignment with consumer intent and safeguard their delicate info,” Microsoft mentioned.

🎥 Cybersecurity Webinars

Tips on how to Detect Hidden Dangers in AWS, AI, and Kubernetes — Earlier than Attackers Do: Cloud threats are getting smarter—and tougher to see. Be a part of our consultants to learn the way code-to-cloud detection reveals hidden dangers throughout identities, AI, and Kubernetes, serving to you cease assaults earlier than they attain manufacturing.
Study How Prime Groups Safe Cloud Infrastructure Whereas Staying Totally Compliant: Securing cloud workloads is not simply protection — it is about enabling innovation safely. Study sensible, confirmed methods to strengthen entry management, keep compliance, and shield infrastructure with out slowing agility.
Tips on how to Patch Quicker and Safer: The Guardrail Framework That Really Works: Group patching is quick, versatile, and simple to get flawed. This session exhibits construct guardrails, spot repo dangers early, and steadiness pace with safety utilizing confirmed, field-tested strategies.

🔧 Cybersecurity Instruments

LUMEN — It’s a browser-based Home windows Occasion Log analyzer that runs completely in your machine. It lets analysts add a number of EVTX information, run SIGMA detections, correlate occasions into storylines, extract IOCs, and export findings—all with out knowledge leaving the gadget. Designed for safe, offline investigations, it helps curated and customized SIGMA guidelines, dashboards, and native session storage for environment friendly, privacy-focused log evaluation.
Pi-hole — It’s a network-wide DNS sinkhole that blocks adverts, trackers, and undesirable domains earlier than they attain your units. Put in on native {hardware} or servers, it filters all community visitors with out consumer software program and supplies a dashboard and CLI for monitoring, customized blocklists, and DNS management.

Disclaimer: These instruments are for studying and analysis solely. They have not been absolutely examined for safety. If used the flawed method, they may trigger hurt. Examine the code first, take a look at solely in secure locations, and comply with all guidelines and legal guidelines.
Conclusion
If there’s one theme this week, it is this: no one is “too small” or “too boring” to be a goal anymore. The weak hyperlink is normally one thing easy — a bundle nobody checked, a vendor nobody questioned, a “short-term” token that by no means received revoked, a visitor account no one owns. Attackers love that stuff as a result of it really works.
So do not simply shut this tab and transfer on. Decide one factor from this recap you may act on immediately — rotate a set of keys, tighten entry for one vendor, evaluation visitor accounts, lock down an replace path, or repair one high-risk bug. Then share this with the individuals who can break issues and sort things with you. The hole between “we should always do that” and “we really did” is the place most breaches stay.

The Hacker News Tags:CVEs, Email, Firefox, Hot, M365, NPM, Raid, RCE, Returns, Worm

Post navigation

Previous Post: Mystery OAST With Exploit for 200 CVEs Leveraging Google Cloud to Launch Attacks
Next Post: Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally

Related Posts

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The Hacker News
The Hidden Weaknesses in AI SOC Tools that No One Talks About The Hacker News
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams The Hacker News
MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More The Hacker News
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host The Hacker News
WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark