Aggregator
CVE-2022-37005 | Huawei HarmonyOS Settings App argument injection
CVE-2021-40030 | Huawei HarmonyOS My Huawei App information disclosure
CVE-2022-1705 | Google Go up to 1.17.11/1.18.3 net-http Transfer-Encoding request smuggling (FEDORA-2022-30c5ed5625 / Nessus ID 211529)
CVE-2022-30630 | Google Go up to 1.17.11/1.18.3 io-fs recursion (FEDORA-2022-30c5ed5625 / Nessus ID 211529)
CVE-2022-30633 | Google Go up to 1.17.11/1.18.3 encoding-xml Unmarshal recursion (FEDORA-2022-30c5ed5625 / Nessus ID 211529)
CVE-2022-30635 | Google Go up to 1.17.11/1.18.3 encoding-gob recursion (FEDORA-2022-30c5ed5625 / Nessus ID 208109)
Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI
Attackers have turned AI into a “force multiplier” for the country’s expansive scheme to get and keep operatives hired at global companies, researchers said.
The post Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI appeared first on CyberScoop.
Alleged Leak of 557,892 Vivo Brazil Customer Accounts by V For Vendetta Cyber Team
Cylake Offers AI-Native Security Without Relying on Cloud Services
Middle East Conflict Fuels Opportunistic Cyber Attacks
IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that capitalizes on the elevated political climate in the Middle East. This increased malicious activity includes discoveries that are directly tied to the ongoing conflict, alongside other related findings. ThreatLabz identified over 8,000 newly registered domains with keywords tied to the Middle East political situation and conflict-themed events. Most of these domains currently have no content but they may be weaponized or used in threat campaigns in the near future. Analysis of the active domains revealed several trends, including conflict monitoring sites, conflict-themed meme-coins, short-lived storefronts selling conflict-related merchandise, general blogs and conflict-themed games, and scam or betting-related Progressive Web Apps (PWAs). ThreatLabz will continue monitoring newly registered domains and currently inactive domains for emerging threat campaigns. In this blog, ThreatLabz examines multiple cases, including a conflict-themed lure designed to look like a PDF about missile strikes in Bahrain, a malware chain that uses a conflict-themed lure to deliver the LOTUSLITE backdoor via DLL sideloading, and a fake news blog campaign that redirects users to StealC malware. We also detail fake government and payment phishing sites designed to collect victim data, donation and online storefront scams that route payments to suspicious destinations, and meme-coin promotions consistent with pump-and-dump schemes. RecommendationsGiven the recent threat campaigns targeting the Middle Eastern countries discussed in this blog, ThreatLabz recommends the following best practices to help strengthen an organization’s defenses and reduce the risk of compromise.Minimize the attack surface: Make apps (and vulnerable VPNs) invisible to the internet, and impossible to compromise, ensuring an attacker can’t gain initial access.Prevent initial compromise: Inspect all traffic inline to automatically stop zero-day exploits, malware, or other sophisticated threats.Enforce least privileged access: Restrict permissions for users, traffic, systems, and applications using identity and context, ensuring only authorized users can access named resources.Block unauthorized access: Use strong multi-factor authentication (MFA) to validate user access requests.Eliminate lateral movement: Connect users directly to apps, not the network, to limit the blast radius of a potential incident.Stop data loss: Inspect data in motion and data at rest to stop active data theft during an attack.Deploy active defenses: Leverage deception technology with decoys to detect hands-on-keyboard activity from compromised endpoints and block access to real applications containing the attack.Cultivate a security culture: Many breaches begin with compromising a single user account via a phishing attack. Prioritizing regular cybersecurity awareness training can help reduce this risk and protect employees from compromise.Test your security posture: Get regular third-party risk assessments and conduct purple team activities to identify and harden the gaps in security program. Organizations should request that service providers and technology partners do the same and share the results of these reports with the organization's security team.OverviewIn Cases 4 and 5, ThreatLabz observed Persian-language comments embedded in page sources and associated code. While these artifacts are not definitive attribution, they may provide useful context about the operator’s working environment and suggest a potential Iran-aligned threat actor. In the remaining campaigns covered in this blog, ThreatLabz did not observe the same code-level indicators; however, we did see threat actors capitalizing on the conflict in the Middle East by leveraging themes like Iran and geopolitical developments to drive engagement.Case 1: Suspected targeted attack in the Gulf Cooperation Council (GCC) region On March 1, 2026, ThreatLabz observed a ZIP archive containing files related to the Middle East conflict. The archive included a Windows shortcut (LNK) file that, when opened, downloaded a malicious Windows Compiled HTML Help (CHM) file from a threat actor-controlled server. The CHM file was then used to deploy a shellcode loader, a highly obfuscated shellcode, and eventually a backdoor. As part of the lure, the attack dropped a decoy PDF containing images of missile strikes.The Arabic text in the PDF translates to “Iranian missile strikes against US base in Bahrain”. The figure below shows the decoy PDF file used in this attack.Figure 1: PDF lure referencing Iranian missile strikes against a US base in Bahrain.The following sections summarize the observed attack flow and the files involved.Stage 1The ZIP archive contains an LNK file named photo_2026-03-01_01-20-48.pdf.lnk. The LNK’s target command line uses cURL to download a malicious CHM file from hxxps://www.360printsol[.]com/2026/alfadhalah/thumbnail?img=index.png. The LNK file then uses the legitimate Windows HTML Help executable (hh.exe) with the -decompile option to extract the CHM contents. The files extracted from the CHM are:0.lnk: Stage 2 Windows shortcut3: Decoy PDF used as a lure4: TAR archive containing malicious componentsThe Stage 1 LNK launches the Stage 2 shortcut (0.lnk).Stage 2The Stage 2 LNK performs the following actions:Copies the decoy PDF from file 3 and writes it as photo_2026-03-01_01-20-48.pdf.Treats file 4 as a TAR archive and extracts its contents into %AppData%.Executes %AppData%\BaiduNetdisk\ShellFolder.exe with the argument: --path a.Next, ShellFolder.exe uses DLL sideloading to load a malicious DLL named ShellFolderDepend.dll.ShellFolderDepend.dll analysis (Shellcode loader)ShellFolderDepend.dll is a 32-bit DLL that establishes persistence and then decrypts and executes embedded shellcode.To establish persistence, the DLL enumerates running processes to determine whether bdagent.exe (Bitdefender Agent) is present. Based on the result, the DLL uses one of two persistence methods:If bdagent.exe is running: the DLL uses reg.exe to set a Run key pointing to the host binary (ShellFolder.exe):C:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /reg:64 /v BaiNetdisk /t REG_SZ /d "\"%s\" --path a" /fIf bdagent.exe is not running: the DLL sets the same Run key directly using RegSetValueExA.The DLL calls the Windows Native API SystemFunction033 (RC4) to decrypt shellcode stored in Shelter.ex (located alongside the DLL) using the key 20260301@@@. The DLL then:Allocates executable memory with VirtualAlloc.Copies the decrypted shellcode into memory.Transfers execution to the decrypted shellcode.StatusAnalysis of the next-stage shellcode is still in progress. ThreatLabz will update this blog post as more details become available and plan to publish a deeper follow-up analysis.Case 2: LOTUSLITE backdoor used in Iran conflict-themed lures by Mustang PandaOn March 4, 2026, ThreatLabz identified a malicious ZIP archive whose name is related to the conflict theme. Executing the malware in the archive triggered the download and execution of the LOTUSLITE backdoor.The ZIP contained:A legitimate KuGou music software binary, renamed by the threat actor to Iran Strikes U.S. Military Facilities Across Gulf Region.exeA malicious DLL, libmemobook.dllBased on the extracted directory name, JCPOA, ThreatLabz assesses the contents were intended to appear related to the Joint Comprehensive Plan of Action (JCPOA), the Iran nuclear deal signed in 2015. The file name Iran Strikes U.S. Military Facilities Across Gulf Region.exe appears deliberately chosen to align with ongoing military conflict in the Middle East.When executed, the legitimate executable sideloads the malicious libmemobook.dll located in the same directory.Stage 1: libmemobook.dll analysis (LOTUSLITE downloader)libmemobook.dll is a 32-bit C++ DLL used to download the next-stage payloads and set up persistence on the endpoint. The malicious functionality is implemented in the export function named ProcessMain.On the first run, the downloader performs checks to determine whether LOTUSLITE is already installed. It looks for two files under C:\ProgramData\CClipboardCm\.WebFeatures.exekugou.dllThe downloader also verifies that both files match expected file sizes. If the checks pass, the downloader launches WebFeatures.exe and then exits.If the environment checks fail, the downloader begins its installation routine:Ensures it is running from the target directory: The downloader checks whether it is already executing from C:\ProgramData\CClipboardCm\. If not, it creates the directory and copies:itself to C:\ProgramData\CClipboardCm\libmemobook.dllthe legitimate host executable to C:\ProgramData\CClipboardCm\SafeChrome.exeEstablishes persistence: The downloader creates a Windows Run keyHKCU\Software\Microsoft\Windows\CurrentVersion\Run\ACboardCmand sets it to: C:\ProgramData\CClipboardCm\SafeChrome.exe.The downloader then checks for the next-stage components in C:\ProgramData\WebFeatures\.WebFeatures.exekugou.dllIf both files are present and their sizes validate, the downloader executes WebFeatures.exe via CreateProcessW. WebFeatures.exe then sideloads the malicious DLL kugou.dll from the same directory, continuing the infection chain.If the next-stage payloads are not present, the downloader decrypts embedded shellcode, allocates executable memory using VirtualAlloc, copies the decrypted shellcode into the allocated region, and executes it indirectly by:setting the EnumFontsW callback to the shellcode address, andinvoking EnumFontsW to trigger execution.Shellcode analysisThe 32-bit shellcode primarily downloads and drops the next-stage payloads using the pre-configured URLs in the table below.URLDownloaded Filenamewww.e-kflower[.]com/_prozn/_skin_mbl/home/KApp.rarWebFeatures.exewww.e-kflower[.]com/_prozn/_skin_mbl/home/KAppl.rarkugou.dllTable 1: Pre-configured URLs used by the shellcode.It is worth noting that the domain e-kflower[.]com is compromised and used by the threat actor to stage the payloads.The shellcode hardcodes the User-Agent used for all network requests to Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36. This User-Agent is applied consistently across its HTTP traffic to mimic legitimate Chrome browser activity. After downloading the next-stage payloads, the downloader copies them to C:\ProgramData\WebFeatures\. It then establishes persistence by creating the following Run key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ASEdge and setting it to launch C:\ProgramData\WebFeatures\WebFeatures.exe -Edge.Stage 2: kugou.dll analysisWebFeatures.exe is a legitimate data importer utility from the KuGou music software suite. When executed from the compromised directory, it sideloads the malicious kugou.dll placed alongside it. ThreatLabz observed substantial code overlap between kugou.dll and the LOTUSLITE backdoor documented in January 2026, including use of the same C2 IP address: 172.81.60[.]97.Threat actors associated with LOTUSLITE appear to rapidly weaponize themes tied to active geopolitical events. In January 2026, they leveraged narratives related to tensions between the United States and Venezuela. In this campaign, we observed them adopting a Middle East conflict theme.Case 3: Fake news blogs leading to StealC malwareThreatLabz identified a fake news blog site hosting malicious JavaScript that leads to the download of StealC malware. The scripts used in this campaign can detect the visitor’s device type (e.g. smartphone, desktop, or small-screen devices). An example of a fake news site is shown below.Figure 2: Iran-themed fake news site used to distribute StealC malware hosted at goldman-iran-krieg[.]pages[.]dev.The malicious JavaScript redirects victims to a file-hosting page that delivers the StealC payload in a password-protected ZIP archive. The password is provided on the same page, as shown in the figure below.Figure 3: File-hosting page hosting a password-protected ZIP containing StealC.The full attack flow for delivering StealC is shown below.Figure 4: StealC delivery flow.Case 4: Fake US Social Security portalIn this case, a newly registered domain cfgomma[.]com hosted a fraudulent replica of the US Social Security Administration (SSA) portal, as shown in the figure below. Figure 5: Fake SSA portal hosted at cfgomma[.]com.Inspecting the page source revealed Persian-language comments, as shown in the figure below.Figure 6: Persian-language comments in the page source code. When the victim clicks the “Download your statement” option, the site triggers the download of PDQConnect, a legitimate remote monitoring and management (RMM) tool. If the victim installs and runs the software, the threat actor could potentially gain remote access to the system and perform follow-on activity like data exfiltration.Case 5: Fake Israeli Kvish 6 toll payment siteIn the next case, the domain 017[.]65c[.]mytemp[.]website hosted a fraudulent site impersonating Israel’s Kvish 6 toll payment gateway, as shown in the figure below. Figure 7: Fake Kvish 6 toll payment site hosted at 017[.]65c[.]mytemp[.]website.The fake page collects victim information such as IP address and device type, then tricks the victim into providing license-related details before prompting them to enter payment information to pay a supposed fine. Similar to the previous case, the page source for this fraudulent site contains Persian-language comments, as shown below.Figure 8: Persian-language comments in the page source code.The submitted data is forwarded to a Telegram bot, as shown in the figure below.Figure 9: Example of victim-submitted data forwarded to the Telegram bot.Case 6: Conflict-themed donation scam ThreatLabz observed several pages posing as humanitarian relief or “support” campaigns. Rather than directing funds to verifiable charities, the payment flows route victims to suspicious Google Pay (GPay) identifiers or cryptocurrency wallet addresses. An example of this fake donation scam is shown in the figure below.Figure 10: Fake donation site, hosted at irandonation[.]org, redirecting payments to suspicious cryptocurrency wallet addresses.Case 7: Conflict-themed storefront scamThreatLabz observed conflict-themed storefronts advertising “support” apparel, accessories, or limited-edition merchandise. These sites often show characteristics consistent with opportunistic fraud (e.g., minimal business details, recently created domains, and limited contact/return information), suggesting risks ranging from non-delivery scams to potential payment-card harvesting. An example of this potentially fraudulent shopping site is shown in the figure below.Figure 11: Potentially fraudulent shopping site hosted at nowarwithiran[.]store. Case 8: Meme-coin and pump-and-dump promotionsThreatLabz observed additional pages promoting conflict-themed tokens, using emotionally charged messaging and “breaking news” style content to create artificial hype. These campaigns aim to trigger rapid buying pressure and then sell off holdings once liquidity increases, leaving late buyers with losses. An example of this promotion is shown in the screenshot below.Figure 12: Pump-and-dump promotion for the $KHAMENEI meme coin hosted at khameneisol[.]xyz. Related ThreatLabz ResearchThreatLabz previously reported on suspected Iran-nexus activity targeting Iraqi government officials in a campaign active since Jan 2026. Visit Dust Specter APT Targets Government Officials in Iraq. ConclusionAs the geopolitical tensions in the Middle East rise, cybercriminals are quick to take advantage. By understanding the threat campaigns outlined in this advisory, organizations can strengthen their defenses and reduce the risk of compromise.Zscaler CoverageZscaler’s multilayered cloud security platform detects indicators related to this activity at various levels, including:Threat ActivityZscaler CoverageConflict-themed scamsAdvanced Threat Protection - HTML.Phish.RC.M.WMTFake news blogs leading to StealC malwareAdvanced Threat Protection - Win64.PWS.StealcStealC payloadShown in figure below.Figure 13: Zscaler Sandbox report for StealC.Indicators Of Compromise (IOCs) StealCIndicator typeValueMD5098BC0DD6A02A777FABB1B7D6F2DA505C280.97.160[.]190Domains hosting StealCmedia.hyperfilevault2[.]momarch2.maxdatahost1[.]cyouarch.megadatahost1[.]lolmedia.megafilehost2[.]sbsmedia.megadatahost1[.]lolarch2.megadatahost1[.]lolmedia.maxdatahost1[.]cyouRedirecting domainsflourishingscreencousin[.]comHolidayslettucecircumvent[.]comLOTUSLITE backdoor campaignFile indicators HashesFilenameDescription972585e50798cb5f122f766d8f26637f1b3fa84de23c6e789958462e6185e9cf0680ed9cdb40546435a7c42b32493301e333c8c0010e652fecd02463614a386f916055ecIran Strikes U.S. Military Facilities Across Gulf Region.exeLegitimate binary.6accd57e48c34cadc998d00594229e42Be34901237c9fa9563e8dc9e71faf3a7e68f983f4fb9b5d115bceee45a89447fb2565faef07452cda6b8e244e53ad91499c3d9b5libmemobook.dllMalicious stage 1 DLL.8c5a4dafed1586cec48d8eda267d8e42B9dfc411699e07343b9b95daa79fe7e4b681157924b11b4b999b385bede48ad9f0570e2e5da4a2054b96738b1e4d4946ece94bc1N/ADecrypted shellcode.722bcd4b14aac3395f8a073050b9a578E5baecb74c456df26aa7e0fa1661838cd86ccfd7819f586ca65395bdd191a21e9b4f3281159f9826e4de0e908277518dba809e5bWebFeatures.exeLegitimate data importer utility from the KuGou music software suite.10fb1122079b5ae8e4147253a937f40f7d4e31c8b11be7c970860c4fbc8fe85c70724cb18564763407064117726211ff8f89555e5a3b2b70bc9667032abd69cbe53b5216kugou.dllStage 2 DLL (LOTUSLITE).Network indicatorsTypeIndicatorURLwww.e-kflower[.]com/_prozn/_skin_mbl/home/KApp.rarURLwww.e-kflower[.]com/_prozn/_skin_mbl/home/KAppl.rarC2 IP address172.81.60[.]97
The post Middle East Conflict Fuels Opportunistic Cyber Attacks appeared first on Security Boulevard.
Analysis: Blast Radius for Third-Party Breaches Bigger Than Reported
An analysis of 136 unique major breaches involving third-parties affecting 710 companies, published this week by Black Kite, finds approximately 26,000 additional organizations were impacted, affecting as many as 433 million individuals. Ferhat Dikbiyik, chief research and intelligence officer for Black Kite, said the analysis shines a spotlight on the fact that the actual blast..
The post Analysis: Blast Radius for Third-Party Breaches Bigger Than Reported appeared first on Security Boulevard.
5 Actions Critical for Cybersecurity Leadership During International Conflicts
The recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must continually incorporate geopolitical risk into their enterprise cyber risk posture and preparedness.
Every crisis that elevates to military engagements between cyber-active participants, changes the risk landscape of businesses, for people, operations, and data. This includes the company and its suppliers, partners, and customers.
Gauging the risk requires incorporation of factors that are vague at best, but understanding the enemy can provide a much clearer picture to help cybersecurity and executive leadership in making good decisions.
Like the current Russian-Ukrainian war, the participants in the Iran strikes are very active in the cyber world. The US, Israel, and Iran all have significant cyber offensive capabilities, that when used may have direct or indirect consequences on enterprises, critical infrastructures, and global trade.
Corporate organizations, including cybersecurity, should conduct an open risk assessment that is updated as the situation develops. The outcomes should highlight recommendations to mitigate unacceptable risks-of-loss.
The first concern should be for worker safety. There is an ethical and legal responsibility to make sure people are safe. It is just the right thing to do! So, understand if any worker, or their families, are at risk of harm and take appropriate steps in alignment with corporate and government direction.
The second is to understand the risks to operations. Cyber-attacks, potentially in combination with kinetic damage, may have an impact on operations. Direct attacks against corporate assets or critical infrastructures they depend upon, such as the electrical grid and communication networks, may cause interruption, damage, or instability of operations. Supply chain risks must also be included in assessments as such attacks occurring against 3rd party suppliers and vendors can have material impacts.
The last aspect is around data. Kinetic damage is a risk, but most specifically, cyber-attacks can have widespread impacts of destruction or corruption of business data. Again, the 3rd party risks are also very relevant.
During times of international instability and warfare, such as we are witnessing now, I recommend the following 5 steps for cybersecurity leaders to prepare and manage the evolving risks:
- Understand risks and collaboratively develop recommendations — The first step is to develop a deep, shared understanding of the specific threats on the horizon. Start with clarity. Develop a grounded understanding of the current threat landscape and how it intersects with your organization’s business model, technology dependencies, and risk tolerance. This isn’t just a technical exercise; it requires sitting down with business partners to map digital risks to real-world operational impacts. By collaboratively developing recommendations, you ensure that when you present to the executive board, your security posture is perfectly aligned with enterprise priorities.
- Be safe, lead with focus and calm — Operate cybersecurity functions with extra focus and attention, consider temporarily turning on more telemetry and logging, and explore accelerating patching of vulnerabilities and streamlining the SecOps incident escalation processes.
- Be prepared for the worst — Resilience is built before the crisis, not during it. Take advantage of the opportunity to prepare:
- Dust off incident response playbooks for Operations, crisis response, and recovery.
- Verify contact information, roles, and responsibilities. Now is the time to find out someone critical is on vacation and to designate a backup.
- Validate incident response and digital forensics vendor contracts.
- Verify backups, recovery capabilities, and processes. Take a new data snapshot
- Plan for 3 scenarios and consider this a great time for quick tabletop walk-throughs.
1. Limited(degraded) operations or data availability — partial outages, system exploitations, or constrained service availability that require targeted responses and accelerated decisions to limit damage based upon the attackers’ likely intentions
2. Ambiguity, fog-of-war uncertainty — situations where communication or telemetry are disrupted or impaired. Teams must deal with the fear of unknown. Work through how the uncertainty will be managed; do you wait, respond, engage failovers, and at what threshold should management be informed.
3. Unavailable, damaged, or compromised assets — Significant destruction or compromise incidents that mandates activation of crisis response activities and coordinated recovery.For all these scenarios, stress-test your assumptions about dependencies. What happens if specific personnel are unreachable? If a key cloud provider experiences disruption? If a critical SaaS platform is unavailable?
Resilience depends on understanding these constraints in advance.
- Monitor the situation. Remain vigil and support sustainability by keeping teams calm, focused, healthy, and positive. Don’t overwork people unless an incident warrants it. Burnout is a real threat.
- Update executive leadership. Maintain a channel for communicating relevant risk changes, impacts, posture preparedness, and set a cadence for future communication when appropriate. Executive leadership must be well informed and confident that the risks are being properly managed. Report-outs should be brief, meaningful, calm, and professional.
Preparation does not eliminate risk, but it dramatically improves how an organization experiences and manages it. When security leaders combine clarity, discipline, readiness, and measured communication, they position the enterprise to navigate uncertainty with strength rather than reaction.
Cybersecurity leadership plays an important role in crisis management for companies that rely on digital technology, vendors, online services, and global communications.
Incorporate geopolitical crisis events into the corporate cyber risk posture and showcase how the company can be prepared, even for extreme situations like international warfare.
The post 5 Actions Critical for Cybersecurity Leadership During International Conflicts appeared first on Security Boulevard.
DragonForce
You must login to view this content
New ClickFix Attack leverages Windows Terminal for Payload Execution
Cybersecurity researchers have uncovered a new wave of ClickFix attacks that now exploit Windows Terminal to deliver malicious payloads directly onto victim machines. Unlike earlier iterations of this social engineering technique, which relied on the Windows Run dialog, this latest campaign leads users into opening a privileged command environment themselves, making it harder to detect […]
The post New ClickFix Attack leverages Windows Terminal for Payload Execution appeared first on Cyber Security News.
Ракеты прилетели туда, откуда ломали почту Трампа. Израиль взялся за иранских хакеров в Тегеране
Building Bridges, Breaking Pipelines: Introducing Trajan
TL;DR: Trajan is an open-source CI/CD security tool from Praetorian that unifies vulnerability detection and attack validation across GitHub Actions, GitLab CI, Azure DevOps, and Jenkins in a single cross-platform engine. It ships with 32 detection plugins and 24 attack plugins covering poisoned pipeline execution, secrets exposure, self-hosted runner risks, and AI/LLM pipeline vulnerabilities. It […]
The post Building Bridges, Breaking Pipelines: Introducing Trajan appeared first on Praetorian.
The post Building Bridges, Breaking Pipelines: Introducing Trajan appeared first on Security Boulevard.
Qilin
You must login to view this content
Qilin
You must login to view this content
Qilin
You must login to view this content