Normal view
Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid
10 years after disrupting the Ukrainian power grid, the APT targeted Poland with data-wiping malware.
The post Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid appeared first on SecurityWeek.
Poland's energy grid was targeted by never-before-seen wiper malware
Researchers on Friday said that Polandβs electric grid was targeted by wiper malware, likely unleashed by Russia state hackers, in an attempt to disrupt electricity delivery operations.
A cyberattack, Reuters reported, occurred during the last week of December. The news organization said it was aimed at disrupting communications between renewable installations and the power distribution operators but failed for reasons not explained.
Wipers R Us
On Friday, security firm ESET said the malware responsible was a wiper, a type of malware that permanently erases code and data stored on servers with the goal of destroying operations completely. After studying the tactics, techniques, and procedures (TTPs) used in the attack, company researchers said the wiper was likely the work of a Russian government hacker group tracked under the name Sandworm.


Β© Getty Images
Data Leak Exposes 149M Logins, Including Gmail, Facebook
A massive unsecured database exposed 149 million logins, raising concerns over infostealer malware and credential theft.
The post Data Leak Exposes 149M Logins, Including Gmail, Facebook appeared first on TechRepublic.
Data Leak Exposes 149M Logins, Including Gmail, Facebook
A massive unsecured database exposed 149 million logins, raising concerns over infostealer malware and credential theft.
The post Data Leak Exposes 149M Logins, Including Gmail, Facebook appeared first on TechRepublic.
149M Logins from Roblox, TikTok, Netflix, Crypto Wallets Found Online
Venezuelan Nationals Face Deportation After Multi State ATM Jackpotting Scheme
Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks
Researchers with Cyata and BlueRock uncovered vulnerabilities in MCP servers from Anthropic and Microsoft, feeding ongoing security worries about MCP and other agentic AI tools and their dual natures as both key parts of the evolving AI world and easy targets for threat actors.
The post Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks appeared first on Security Boulevard.
From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience
When ransomware cripples a businessβs systems or stealthy malware slips past defenses, the first instinct is to get everything back online as quickly as possible. That urgency is understandable β Cybersecurity Ventures estimates ransomware damage costs $156 million per day. But businesses cannot let speed overshadow the more pressing need to understand exactly what happened,..
The post From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience appeared first on Security Boulevard.
Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware
Fake Captcha and βClickFixβ lures have emerged as among the most persistent and deceptive malware-delivery mechanisms on the modern web. These pages mimic legitimate verification challenges from trusted services like Cloudflare, tricking users into executing malicious commands disguised as security checks or browser validation steps. What appears to be a routine security interstitial something millions [β¦]
The post Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Threat Actors Exploit LNK Files to Deploy MoonPeak Malware on Windows Systems
A sophisticated three-stage malware attack campaign against Windows users in South Korea using specially crafted LNK (shortcut) files. The attack begins with a deceptive LNK file named βμ€μ νΈλ μ΄λ© ν΅μ¬ λΉλ²μ.pdf.lnkβ (translating to βPractical Trading Core Secret Bookβ), specifically crafted to target South Korean investors seeking financial guidance. This social engineering approach exploits usersβ trust [β¦]
The post Threat Actors Exploit LNK Files to Deploy MoonPeak Malware on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Disable Windows Security With New Malware Attack
Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture.
The post Hackers Disable Windows Security With New Malware Attack appeared first on TechRepublic.
Hackers Disable Windows Security With New Malware Attack
Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture.
The post Hackers Disable Windows Security With New Malware Attack appeared first on TechRepublic.
Hackers Are Using LinkedIn DMs and PDF Tools to Deploy Trojans
VoidLink Malware Puts Cloud Systems on High Alert With Custom Built Attacks
New Multi-Stage Windows Malware Disables Microsoft Defender, Deploys Malicious Payloads
A sophisticated multi-stage malware campaign targeting Russian users, leveraging social engineering, legitimate cloud services, and native Windows functionality to achieve full system compromise without exploiting vulnerabilities. The campaign begins with deceptively crafted business-themed documents delivered via compressed archives. Victims receive Russian-language files that appear to be routine accounting tasks, but the archive contains a malicious [β¦]
The post New Multi-Stage Windows Malware Disables Microsoft Defender, Deploys Malicious Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

New AI-Powered Android Malware Automatically Clicks Ads on Infected Devices
A sophisticated new Android malware family dubbed βAndroid.Phantomβ that leverages artificial intelligence to automate ad-clicking fraud while establishing a persistent command-and-control infrastructure through dual-mode operation. The malware operates through two distinct modes βphantomβ and βsignalingβ controlled from theΒ hxxps://dllpgd[.]clickΒ command server. The ML model downloads fromΒ hxxps://app-download[.]cn-wlcb[.]ufileos[.]comΒ and analyzes screenshots of virtual screens to identify and automatically click ad [β¦]
The post New AI-Powered Android Malware Automatically Clicks Ads on Infected Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

-
GBHackers
- ClearFake malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature
ClearFake malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature
A sophisticated evolution of the ClearFake malware campaign has emerged, deploying advanced evasion techniques that abuse legitimate Windows components to bypass endpoint detection systems. The operation, which has compromised hundreds of websites since August 2025, now leverages a command injection vulnerability in a trusted Windows script to silently execute malicious PowerShell code, while hosting its [β¦]
The post ClearFake malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

North Korean Hackers Target macOS Developers via Malicious VS Code Projects
The hackers trick victims into accessing GitHub or GitLab repositories that are opened using Visual Studio Code.
The post North Korean Hackers Target macOS Developers via Malicious VS Code Projects appeared first on SecurityWeek.
VoidLink Emerges: First Fully AI-Driven Malware Signals a New Era of Cyber Threats
A sophisticated Linux malware framework developed almost entirely through artificial intelligence, marking the beginning of a new era in AI-powered threats. Unlike previous AI-generated malware linked to inexperienced threat actors, VoidLink represents the first documented case of high-complexity, production-grade malware authored by AI under the direction of a skilled developer. Development artifacts exposed through operational [β¦]
The post VoidLink Emerges: First Fully AI-Driven Malware Signals a New Era of Cyber Threats appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
