Normal view

There are new articles available, click to refresh the page.
Yesterday — 5 December 2025Main stream

If You’re A PEPE Investor, You Need To See This Or Risk Losing Your Coins

5 December 2025 at 11:30

PEPE investors are at risk of losing their coins following a recent security incident. On-chain security firm Blockaid drew attention to a front-end attack on the meme coin’s website that could potentially drain users’ funds. 

PEPE Investors At Risk With Website Front-End Attack

In an X post, Blockaid stated that its system identified a front-end attack on PEPE’s website. The security firm further revealed that the site contains a code of Inferno Drainer. This malware is known to be used to automatically drain users’ wallets, which puts holders at risk of losing their coins. 

The Inferno Drainer malware is said to redirect visitors on the website to a fake portal, where they risk clicking phishing links that are designed to drain their wallets. As such, the security firm advised investors and community members to avoid the website until the issue is resolved. 

PEPE

Blockaid’s Threat Intelligence Team also told Cointelegraph that the Inferno Drainer code detected on the website matched a known drainer family they regularly identify. Meanwhile, the team has yet to make a statement on their official X platform regarding the malware. 

Notably, the website on the PEPE X platform redirects to a fake website (pepedotvip) instead of the original site (pepedotcom). The website also promotes a PEPE derivative, which is believed to be a rug coin. The price remained steady amid reports of the hack, climbing as high as 4% yesterday. 

However, the meme coin price has since retraced as part of a broader crypto market correction led by Bitcoin. The third-largest meme coin by market cap is also down over 75% year-to-date (YTD) thanks to the recent crypto market crash

The Rise In Inferno Drainer Attacks

The PEPE front-end isn’t the first to fall victim to an Inferno Drainer attack this year. Earlier in the year, Blockaid had identified that CoinMarketCap’s frontend was compromised by what appeared to be an Inferno Drainer. Back then, the CoinMarketCap website displayed a pop-up prompting users to verify their wallets, which ultimately drained their funds. 

The BNB Chain X account was also a victim of this Inferno Drainer in October. The hackers posted links that directed users to websites that employed the Inferno Drainer toolkit. This incident resulted in a total loss of around $8,000 for users, which the BNB Chain promised to reimburse. 

Blockaid last year revealed that the Inferno Drainer group stole $80 million from Web3 users by exploiting older, malicious decentralized applications. This kind of scam is also said to have tripled last year, resulting in significant losses for investors. 

At the time of writing, the meme coin price is trading at around $0.000004697, down over 3% in the last 24 hours, according to data from CoinMarketCap.

PEPE

CrowdStrike Identifies New China-Nexus Espionage Actor

5 December 2025 at 10:52

CrowdStrike’s investigation shows that WARP PANDA initially infiltrated some victim networks as early as late 2023, later expanding operations.

The post CrowdStrike Identifies New China-Nexus Espionage Actor appeared first on TechRepublic.

Threat Actors Distribute CoinMiner Malware through USB Drives to Infect Workstations

5 December 2025 at 08:18

Cybercriminals continue to exploit USB drives as infection vectors, with recent campaigns delivering sophisticated CoinMiner malware that establishes persistent cryptocurrency-mining operations on compromised workstations. Security researchers have documented an evolving threat that leverages social engineering and evasion techniques to avoid detection while mining Monero cryptocurrency on infected systems. In February 2025, AhnLab Security Intelligence Center […]

The post Threat Actors Distribute CoinMiner Malware through USB Drives to Infect Workstations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

CrowdStrike Identifies New China-Nexus Espionage Actor

5 December 2025 at 10:52

CrowdStrike’s investigation shows that WARP PANDA initially infiltrated some victim networks as early as late 2023, later expanding operations.

The post CrowdStrike Identifies New China-Nexus Espionage Actor appeared first on TechRepublic.

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access

5 December 2025 at 07:06

The cybersecurity landscape continues to evolve as threat actors deploy increasingly sophisticated tools to compromise Windows-based infrastructure. CastleRAT, a Remote Access Trojan that emerged around March 2025, represents a significant addition to the malware arsenal that defenders must now contend with. This newly discovered threat demonstrates the convergence of multiple attack techniques, enabling attackers to […]

The post Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Russian Calisto Hackers Target NATO Research with ClickFix Malware

5 December 2025 at 05:58

Russian intelligence-linked cyber threat actors have intensified their operations against NATO research organizations, Western defense contractors, and NGOs supporting Ukraine, employing sophisticated phishing and credential harvesting techniques. The Calisto intrusion set, attributed to Russia’s FSB intelligence service, has escalated its spear-phishing campaigns throughout 2025, leveraging the ClickFix malicious code technique to target high-value entities across […]

The post Russian Calisto Hackers Target NATO Research with ClickFix Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

China-Nexus Hackers Target VMware vCenter Systems to Deploy Web Shells and Malware Implants

5 December 2025 at 03:53

Throughout 2025, CrowdStrike has identified multiple intrusions targeting VMware vCenter environments at U.S.-based entities, in which newly identified China-nexus adversary WARP PANDA deployed BRICKSTORM malware. WARP PANDA exhibits sophisticated technical capabilities, advanced operations security skills, and extensive knowledge of cloud and virtual machine environments. In addition to BRICKSTORM, WARP PANDA has deployed JSP web shells […]

The post China-Nexus Hackers Target VMware vCenter Systems to Deploy Web Shells and Malware Implants appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems

By: Divya
5 December 2025 at 00:17

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA), joined by Canadian cyber authorities, have issued a joint alert warning of a sophisticated new malware campaign dubbed “BRICKSTORM.” According to the advisory released, state-sponsored hackers from the People’s Republic of China (PRC) are actively using this tool to infiltrate and hide […]

The post CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer

5 December 2025 at 00:01

Cybersecurity researchers uncover a sophisticated Linux campaign that blends legacy botnet capabilities with modern evasion techniques. A newly discovered Linux malware campaign is demonstrating the evolving sophistication of threat actors by combining Mirai-derived distributed denial-of-service (DDoS) functionality with a stealthy, fileless cryptocurrency mining operation. According to research from Cyble Research & Intelligence Labs (CRIL), the […]

The post New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Before yesterdayMain stream

Agencies, IT companies impacted by latest malware from China

4 December 2025 at 17:06

Hackers sponsored by China are targeting federal agencies, technology companies and critical infrastructure sector organizations with a new type of malware affecting Linux, VMWare kernel and Windows environments that may be difficult to detect and eradicate.

The Cybersecurity and Infrastructure Security Agency, the National Security Agency and the Canadian Centre for Cyber Security are strongly advising organizations take steps to scan systems for BRICKSTORM using detection signatures and rules; inventory all network edge devices; monitor edge devices for suspicious network connectivity and ensure proper network segmentation. The organizations released a malware analysis report to help organizations combat the threat.

Nick Andersen of CISA
Nick Andersen is CISA’s executive assistant director for cybersecurity.

“BRICKSTORM underscores the grave threats that are posed by the People’s Republic of China to our nation’s critical infrastructure. State sponsored actors are not just infiltrating networks, they are embedding themselves to enable long term access, disruption and potential sabotage. That’s why we’re urging every organization to treat this threat with the seriousness that it demands,” said Nick Andersen, CISA’s executive assistant director for cybersecurity, during a call with reporters today. “The advisory we issued today provides indicators of compromise (IOCs) and detection signatures to assist critical infrastructure owners and operators in determining whether they have been compromised. It also gives recommended mitigation actions to protect against what is truly pervasive PRC activity.”

CISA says BRICKSTORM features advanced functionality to conceal communications, move laterally and tunnel into victim networks and automatically reinstall or restart the malware if disrupted. Andersen said CISA became aware of the threat in mid-August and it’s part of a “persistent, long-term campaigns of nation state threat actors, in particular those that are sponsored by the People’s Republic of China, to hold at risk our nation’s critical infrastructure through cyber means.”

The malware has impacted at least eight organizations, including one where CISA provided incident response services to. Andersen wouldn’t say how many of those eight were federal agencies or which ones have been impacted.

“This is a terribly sophisticated piece of malware that’s being used, and that’s why we’re encouraging all organizations to take action to protect themselves, and if they do become victims of it or other malicious activity, to report it to CISA, so we can have a better understanding of the full picture of not just where this malware is being employed, but the more robust picture of the wider cyber threat landscape,” Andersen said.

New way to interact with industry

Since January, CISA has issued 20 joint cybersecurity advisories and threat intelligence guidance documents with U.S. allies, including the United Kingdom, Canada, Australia and New Zealand, as well as with our other international partners.

“Together, we’ve exposed nation-state sponsored intrusions, AI enabled ransomware operations and the ever evolving threats to critical infrastructure,” Andersen said.

Along with the warnings and analysis about BRICKSTORM, CISA also launched a new Industry Engagement Platform (IEP). CISA says it’s designed to let the agency and companies share information and develop innovative and security technologies.

“The IEP enables CISA to better understand emerging solutions across the technology ecosystem while giving industry a clear, transparent pathway to engage with the agency,” CISA said in a release. “The IEP allows organizations – including industry, non-profits, academia, government partners … and the research community – with a structured process to request conversations with CISA subject matter experts to describe new technologies and capabilities. These engagements give innovators the opportunity to present solutions that may strengthen our nation’s cyber and infrastructure security.”

CISA says while participation in the IEP does not provide preferential consideration for future federal contracts, it serves as a channel for the government to gain insight into new capabilities and market trends.

Current areas of interest include:

  • Information technology and security controls
  • Data, analytics, storage, and data management
  • Communications technologies
  • Any emerging technologies that advance CISA’s mission, including post-quantum cryptography and other next-generation capabilities

Andersen said while the IEP and related work is separate from the BRICKSTORM analysis, it’s all part of how CISA is trying to ensure all organizations protect themselves from the ever-changing cyber threat.

“The threat here is not theoretical, and BRICKSTORM underscores the grave threats that are posed by the People’s Republic of China to our nation’s critical infrastructure,” he said  “We know that state sponsored actors are not just infiltrating networks. They’re embedding themselves to enable the long term access disruption and potential sabotage that enables their strategic objectives, and that’s why we continue to urge every organization to treat this threat with serious demands.”

The post Agencies, IT companies impacted by latest malware from China first appeared on Federal News Network.

© The Associated Press

FILE - This Feb 23, 2019, file photo shows the inside of a computer. Three former U.S. intelligence and military operatives have agreed to pay nearly $1.7 million to resolve criminal charges that they provided sophisticated hacking technology to the United Arab Emirates. A charging document in federal court in Washington accuses them of helping develop “advanced covert hacking systems for U.A.E. government agencies.” (AP Photo/Jenny Kane, File)

Sryxen Malware Uses Headless Browser Trick to Bypass Chrome Protections

4 December 2025 at 05:27

A new Windows-focused information stealer dubbed “Sryxen” is drawing attention in the security community for its blend of modern browser credential theft and unusually aggressive anti-analysis protections. Sold as malware-as-a-service (MaaS) and written in C++ for 64-bit Windows, Sryxen targets browser secrets, Discord tokens, VPNs, social accounts, and crypto wallets, then exfiltrates everything to its […]

The post Sryxen Malware Uses Headless Browser Trick to Bypass Chrome Protections appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

❌
❌