#browsersecurity

2026-01-14

It's been a busy 24 hours in the cyber world with significant updates on recent attacks, actively exploited vulnerabilities, new malware campaigns, and a reminder about the ever-evolving privacy landscape. Let's take a look:

Kyowon Group Hit by Suspected Ransomware ⚠️
- South Korea's Kyowon Group, a major education and lifestyle company, shut down parts of its network after identifying a suspected ransomware attack.
- The company confirmed an extortion demand and is investigating potential data leakage, including sensitive customer information, possibly affecting millions.
- This incident follows other high-profile data breaches in South Korea, prompting pledges for stronger data protection laws.

🗞️ The Record | therecord.media/kyowon-group-s

Dutch Port Hacked for Cocaine Smuggling 🚨
- A Dutch appeals court upheld a seven-year prison sentence for a man who hacked port IT systems using malware-stuffed USB sticks to aid cocaine smugglers.
- The attacker gained months of remote access, exploring the network and hunting for admin rights, even live-blogging the break-in via encrypted chats.
- The case highlights the real-world impact of cyber intrusions facilitating organised crime, with the hack directly enabling a 210 kg cocaine shipment.

🕵🏼 The Register | go.theregister.com/feed/www.th

Black Axe Leaders Arrested in Spain 🕵️
- Spanish police, supported by Europol, arrested 34 alleged cybercriminals, including leaders of the transnational Black Axe organisation, across four cities.
- Black Axe is known for business email compromise (BEC) scams, money laundering, and vehicle trafficking, with estimated fraud exceeding $6.9 million.
- The operation froze $139,000 in bank accounts and seized cash, vehicles, and devices, significantly disrupting the hierarchical, Nigerian-led group.

🤫 CyberScoop | cyberscoop.com/black-axe-disru

Supreme Court Filing System Hack 🏛️
- A Tennessee man is expected to plead guilty to a misdemeanor charge for hacking into the U.S. Supreme Court’s electronic case filing system on 25 occasions between August and October 2023.
- Nicholas Moore, 24, "intentionally accessed a computer without authorization," though details on the specific information accessed were not released.
- This incident underscores ongoing vulnerabilities in federal judicial systems, which have seen strengthened protections following sophisticated cyberattacks.

🗞️ The Record | therecord.media/guilty-plea-ha

Malicious Chrome Extension Steals MEXC API Keys 💰
- A malicious Google Chrome extension, "MEXC API Automator," is actively stealing API keys from the MEXC cryptocurrency exchange by masquerading as a trading tool.
- The extension programmatically creates new API keys with withdrawal permissions, hides these permissions in the UI, and exfiltrates the keys to a Telegram bot.
- This attack leverages an already authenticated browser session, bypassing traditional authentication, and grants attackers unfettered access to victims' crypto accounts.

📰 The Hacker News | thehackernews.com/2026/01/mali

Gogs Zero-Day Under Active Exploitation 🛡️
- CISA has added CVE-2025-8110, a high-severity path traversal vulnerability in the Gogs self-hosted Git service, to its KEV catalog due to active exploitation.
- The flaw allows authenticated users to bypass previous fixes (CVE-2024-55947) by exploiting symbolic link handling in the PutContents API, leading to remote code execution.
- With no official patch yet, federal agencies are mandated to apply mitigations by February 2, 2026, or cease using Gogs, while other users should disable open registration and restrict access.

📰 The Hacker News | thehackernews.com/2026/01/13/c
🕵🏼 The Register | go.theregister.com/feed/www.th

ServiceNow AI Platform Critical Flaw 🔒
- ServiceNow patched CVE-2025-12420, a critical 9.3 CVSS vulnerability in its AI Platform, allowing unauthenticated users to impersonate others and perform arbitrary actions.
- The flaw stemmed from a universal credential ("servicenowexternalagent") and lack of password/MFA for user identity verification, which could lead to full platform takeover.
- Although no in-the-wild exploitation has been confirmed, the vulnerability was deemed the "most severe AI-driven vulnerability to date" due to ServiceNow's deep integration across enterprise IT.

📰 The Hacker News | thehackernews.com/2026/01/serv
🌑 Dark Reading | darkreading.com/remote-workfor

AI/ML Python Libraries RCE Vulnerabilities 🐍
- Vulnerabilities in popular AI/ML Python libraries (Nvidia's NeMo, Salesforce's Uni2TS, Apple/EPFL VILAB's FlexTok) allow remote code execution via poisoned metadata.
- The flaws exploit Hydra's instantiate() function, which can execute arbitrary callables, enabling attackers to hide malicious code in model metadata that runs automatically upon loading.
- Patches have been issued for NeMo (CVE-2025-23304) and Uni2TS (CVE-2026-22584), with FlexTok also fixed, urging users to only load models from trusted sources.

🕵🏼 The Register | go.theregister.com/feed/www.th

Kremlin-linked Hackers Target Ukraine Military 🪖
- CERT-UA reports a new cyber-espionage campaign by Void Blizzard (UAC-0190) targeting Ukraine's military personnel using a novel PluggyApe malware.
- Attackers impersonate charitable organisations and use messaging apps like Signal and WhatsApp to deliver password-protected malicious executables.
- This campaign highlights a shift towards highly tailored social engineering, leveraging trusted communication channels and detailed target knowledge to deliver malware.

🗞️ The Record | therecord.media/kremlin-linked

SHADOW#REACTOR Delivers Remcos RAT 👻
- A new campaign, SHADOW#REACTOR, uses an evasive multi-stage Windows attack chain to deploy the Remcos RAT for persistent remote access.
- The infection leverages obfuscated VBS launchers, PowerShell downloaders, fragmented text-based payloads, and a .NET Reactor-protected loader to complicate detection.
- This broad, opportunistic activity, likely by initial access brokers, abuses LOLBins like MSBuild.exe and employs self-healing mechanisms to ensure payload delivery.

📰 The Hacker News | thehackernews.com/2026/01/new-

AsyncRAT Campaign Abuses Cloudflare & Python ☁️
- An emerging phishing campaign is delivering AsyncRAT by exploiting Cloudflare's free-tier services (TryCloudflare tunneling) and legitimate Python downloads.
- Attackers use Dropbox links with double-extension files (.pdfurl) in phishing emails, installing a full Python environment to inject code into explorer.exe.
- This technique masks malicious activity under trusted domains and legitimate tools, making detection challenging and highlighting the ongoing effectiveness of phishing and abuse of legitimate services.

🌑 Dark Reading | darkreading.com/endpoint-secur

AVCheck Malware Kingpin Arrested 🚫
- Dutch police arrested a 33-year-old man at Amsterdam's Schiphol Airport, believed to be the mastermind behind the AVCheck online platform.
- AVCheck was a counter-antivirus (CAV) service, shuttered in May by Operation Endgame, that allowed cybercriminals to test malware against various AV products to evade detection.
- The arrest underscores ongoing international law enforcement efforts to dismantle critical components of the cybercrime ecosystem.

🕵🏼 The Register | go.theregister.com/feed/www.th

North Korea's IT Worker & Crypto Theft Schemes 🇰🇵
- The U.S. urged UN member states to take tougher action against North Korea's IT worker scheme and cryptocurrency heists, which fund its weapons programs.
- A 140-page report highlights that over 40 countries are impacted, with North Korean IT workers stealing identities to secure remote jobs and laundered crypto funds exceeding $2 billion last year.
- China and Russia were criticised for providing safe havens, with 1,500 North Korean IT workers estimated in China alone, violating UN Security Council Resolutions.

🗞️ The Record | therecord.media/40-countries-i

India's Strict Crypto KYC/AML Rules 🇮🇳
- India's Financial Intelligence Unit (FIU-IND) updated regulations for crypto service providers, requiring strict client due diligence for all serving Indian residents, even offshore.
- New rules mandate collecting identity documents, bank details, occupation, income, and crucially, "Latitude and longitude coordinates of the onboarding location with date and timestamp along with IP address," plus a selfie.
- These measures aim to combat fraud, money laundering, and terrorism financing in the anonymous and instantaneous crypto transaction landscape.

🕵🏼 The Register | go.theregister.com/feed/www.th

US Cyber Command Leadership Shake-up 🇺🇸
- Air Force Lt. Col. Jason Gargan, commander of a Cyber National Mission Force task force aligned against Russia, was "relieved for cause" due to operational disagreements.
- This unusual dismissal highlights a "loss of trust and confidence" in command ability, with Gargan now expected to retire by the end of 2026.
- The incident occurs amidst other top-rank changes at Cyber Command, which has been without a Senate-confirmed leader for over nine months.

🗞️ The Record | therecord.media/senior-militar

US Cyber Offense vs. Defense Debate ⚖️
- A House Homeland Security subcommittee debated the U.S. approach to cyber deterrence, with some lawmakers warning against expanding offensive cyber operations before strengthening defenses.
- Concerns were raised about CISA losing one-third of its workforce and the potential for offensive actions to provoke retaliation if U.S. networks are not adequately defended.
- While acknowledging the importance of offense, experts suggested a hybrid approach where the private sector supports government offensive operations, with CISA coordinating and receiving legal protections.

🤫 CyberScoop | cyberscoop.com/us-offensive-cy

Mandiant's Salesforce Security Tool 🛠️
- Mandiant has open-sourced AuraInspector, a tool designed to help Salesforce admins detect misconfigurations in Aura (Experience Cloud sites) that could expose sensitive data.
- The tool targets access control issues, such as unauthenticated users gaining access to Salesforce Account object records, and can bypass 2,000-record limits via GraphQL API abuse.
- AuraInspector automates potential abuse techniques and remediation strategies, providing read-only operations to identify damaging misconfigurations without modifying Salesforce instances.

🕵🏼 The Register | go.theregister.com/feed/www.th

#CyberSecurity #ThreatIntelligence #Ransomware #Vulnerability #ZeroDay #RCE #Malware #APT #NationState #Cybercrime #DataPrivacy #InfoSec #IncidentResponse #CloudSecurity #AI #BrowserSecurity #KYC #AML

Tips from Nadiyno.org: choosing a secure password manager for your browser

peertube.eqver.se/w/wpDnNKzRf7

Tips from Nadiyno.org: choosing a secure browser

peertube.eqver.se/w/dxyHtWvcUh

2026-01-09

Two Chrome extensions were caught stealing sensitive data — proof that even trusted add-ons can turn hostile. Install less, verify more. 🧩🔓 #BrowserSecurity #ExtensionRisk

thehackernews.com/2026/01/two-

2026-01-08

Bradon Rogers, Chief Customer Officer at Island, on why enterprise security is moving to the browser session and identity layer as AI accelerates data movement.

technadu.com/why-ai-is-driving

#BrowserSecurity #IdentitySecurity #ZeroTrust #AIinSecurity #CISO

Why AI Is Driving a Rethink of Enterprise Security Boundaries in the Browser
Disappointed_Horse 🇺🇦Disappointed_Horse@mastodonapp.uk
2026-01-07

Has Google defeated Firefox Multi-Account Containers? I was reading Google News in a Google container this morning, and I right-clicked on links to open them in a different container as I always do. Instead, the links are opening in a new tab in a Google container. What's going on with that? #mozilla #firefox #browser #browserprivacy #BrowserSecurity #BrowserExtensions

Brian Greenberg :verified:brian_greenberg@infosec.exchange
2026-01-05

In cybersecurity, the wolf sometimes wears a badge. A long-running campaign known as ShadyPanda quietly built trust by publishing hundreds of browser extensions that worked as advertised, then, years later, flipped the switch and weaponized millions of installs as vectors for spyware, credential theft, and backdoors. That playbook exploits our instincts: we trust high install counts, “verified” badges, and seamless auto-updates. If your attention is good enough for productivity apps, it’s good enough for security hygiene. Regularly audit your extensions, vet developers, and treat your browser like an endpoint that matters in your threat model.

TL;DR
🧠 Useful today, risky tomorrow
⚡ Updates can flip intent
🎓 Treat browsers as endpoints
🔍 Audit extensions monthly

bgr.com/2061288/cyberhackers-b

#CyberSecurity #BrowserSecurity #Privacy #RiskManagement #security #privacy #cloud #infosec #cybersecurity

Amir SarangaAmirSaranga
2026-01-03
2026-01-02

Researchers attribute multiple browser-based malware campaigns—ShadyPanda, Zoom Stealer, and GhostPoster—to a single operator known as DarkSpectre, impacting an estimated 8.8M users.

The operation relied on delayed activation, steganographic payload delivery, and backend-controlled execution logic, enabling long-term persistence without repeated extension updates.

This reinforces the need for continuous extension behavior monitoring, not just marketplace vetting.

What controls have proven effective in your environment?

Source: cybersecuritynews.com/darkspec

Follow TechNadu for measured, technically grounded security reporting.

#InfoSec #ThreatIntelligence #BrowserSecurity #MalwareResearch #TechNadu

DarkSpectre Hackers Infected 8.8 Million Chrome, Edge, and Firefox Users with Malware
2026-01-02

Các trình duyệt cần đảm bảo có sự phê duyệt của con người trước khi thực hiện hành động gửi, nộp hoặc thanh toán. Đây là yếu tố bắt buộc để tránh rủi ro và đảm bảo an toàn! #BrowserSecurity #BảoMậtTrìnhDuyệt #HumanApproval #KiểmSoátConNgười

reddit.com/r/SaaS/comments/1q1

2026-01-01

DarkSpectre Campaign: 8.8M Browser Users Compromised in Sophisticated Chinese Malware Operation

Security researchers at Koi Security just exposed DarkSpectre: a single, well-funded Chinese threat actor behind three coordinated campaigns infecting 8.8 million Chrome, Edge, and Firefox users over 7 years.

Key tactics that make this chilling:

Patient "Time Bombs": Extensions stay benign for 3+ days (even 5 years!) to pass store reviews, then activate malicious payloads.

Steganography Evasion: Hide JS code in PNG logos-looks innocent, executes silently.

Corporate Espionage: Zoom Stealer grabs meeting intel from 28 platforms (Zoom, Teams, Meet) in real-time.

From consumer fraud to boardroom spying. This isn't opportunistic crime, it's nation-state level infrastructure.

Check your extensions NOW. Google/Microsoft have removed some, but won't auto-uninstall.

Full details:
perplexity.ai/page/8-8m-browse

#Cybersecurity #DarkSpectre #Malware #BrowserSecurity

2025-12-31

Researchers have documented a browser extension campaign collecting meeting metadata across multiple conferencing platforms.

The case highlights how functional, long-standing extensions can still introduce intelligence-gathering risks through excessive permissions and real-time data exfiltration.

This reinforces the need for tighter browser controls and regular extension audits in enterprise environments.

Engage in the discussion and follow @technadu for sober, fact-based security reporting.

Source:bleepingcomputer.com/news/secu

#InfoSec #BrowserSecurity #ThreatIntelligence #EnterpriseDefense #CyberRisk #TechNadu

Zoom Stealer browser extensions harvest corporate meeting intelligence
2025-12-23

Part 3 of Everyday Defense is live: Browser hygiene that actually sticks.

Profiles (Daily/Work/Money/Admin), extension hygiene, anti-tracking settings that won’t wreck your day, and a simple safe-download routine.

🔗 kylereddoch.me/blog/cybersecky

#CybersecKyleHowTo #EverydayDefense #BrowserSecurity #Privacy #InfoSec #BlueTeam #DigitalHygiene

Mela News :verified:MelaNews@mastodon.uno
2025-12-23

🌐 Classifica privacy browser: ChatGPT Atlas peggiore, Brave e Mullvad leader.

Chrome e Vivaldi ultimi nella protezione dati, zero punti nel blocco tracker.

#privacytech #browsersecurity #datarisk

neowin.net/news/report-chrome-

N-gated Hacker Newsngate
2025-12-20

🍪🤦 "Privacy is dead, long live anonymity!" they declare, while holding your digital hand through the grand labyrinth of cookie consent and JavaScript hoops. Because nothing screams 'anonymity' like begging your browser for permission to load a page! 🚪🔐
servury.com/blog/privacy-is-ma

2025-12-19

Many smart TVs, gaming apps, and consoles ship with embedded browsers years out of date, exposing users to spoofing and privilege escalation.

Full breakdown:
technadu.com/outdated-embedded

#IoTSecurity #BrowserSecurity #CyberRisk

Outdated Embedded Browsers Expose Smart TVs, Gaming Apps, Game Consoles to Cyber Risks
2025-12-19

A recent analysis revealed Firefox extensions using icon-based steganography to bypass detection, embedding JavaScript loaders beyond PNG image data.

The campaign highlights:
Limitations in static extension scanning
Risks of trusted UI elements
Long-dwell, low-noise monetization tactics
How should browser ecosystems adapt detection models to account for non-code attack surfaces?

Discuss below and follow TechNadu for continued threat research coverage.

#MalwareAnalysis #Steganography #BrowserSecurity #ThreatResearch #ExtensionAbuse

FBI DISRUPTS VIRTUAL MONEY LAUNDERING SERVICE USED TO FACILITATE CRIMINAL ACTIVITY

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst