News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Cyber Attack Hits 16 Popular Chrome Extensions

A total of 3.2 million users were affected by the compromised Google Chrome extensions, with malicious scripts injected for fraud and redirecting affiliate traffic. Researchers have determined that the attack was executed through a supply chain compromise, where the attackers infiltrated trusted extensions and pushed malicious updates without users even realizing it's happening. The extensions in question were originally designed for various purposes but were later updated to include obfuscated scripts that enabled unauthorized data exfiltration and HTTP request modifications.

See Also

The Dark Side of Chrome Extensions: Hidden Dangers Lurking on Your PC Δ1.88

As recent news reminds us, malicious browser add-ons can start life as legit extensions. Reviewing what you’ve got installed is a smart move. Earlier this month, an alarm sounded—security researchers at GitLab Threat Intelligence discovered a handful of Chrome extensions adding code in order to commit fraud, with at least 3.2 million users affected. But the add-ons didn’t start as malicious. Instead, they launched as legitimate software, only to be later compromised or sold to bad actors.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.79

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.78

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Google Is Trying to Bury YouBlock Origin in Chrome Δ1.77

Google is sneakily trying to get users to remove uBlock Origin, but there's a simple workaround you can use to sidestep it. Despite warnings, users of the popular adblocker can continue using it by reactivating it via the Chrome extensions settings. However, this solution may not be available forever as Google aims to discontinue support for legacy Manifest V2-based extensions in the long term.

UBlock Origin Users Face Uncertainty After Chrome Removal Δ1.76

uBlock Origin, a popular ad-blocking extension, has been automatically disabled on some devices due to Google's shift to Manifest V3, the new extensions platform. This move comes as users are left wondering about their alternatives in the face of an impending deadline for removing all Manifest V2 extensions. Users who rely on uBlock Origin may need to consider switching to another browser or ad blocker.

Infostealer Malware Stole 493 Million Accounts: How Your Data May Have Been Compromised Δ1.76

Recently, news surfaced about stolen data containing billions of records, with 284 million unique email addresses affected. Infostealing software is behind a recent report about a massive data collection being sold on Telegram, with 23 billion entries containing 493 million unique pairs of email addresses and website domains. As summarized by Bleeping Computer, 284 million unique email addresses are affected overall.

Web DDoS Attacks See Major Surge as AI Allows More Powerful Attacks Δ1.75

Layer 7 Web DDoS attacks have surged by 550% in 2024, driven by the increasing accessibility of AI tools that enable even novice hackers to launch complex campaigns. Financial institutions and transportation services reported an almost 400% increase in DDoS attack volume, with the EMEA region bearing the brunt of these incidents. The evolving threat landscape necessitates more dynamic defense strategies as organizations struggle to differentiate between legitimate and malicious traffic.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.75

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

The Rise of Fake Spyware Apps in the Play Store Δ1.74

Google's security measures have been breached by fake spyware apps, which are hidden in plain sight on the Google Play Store. These malicious apps can cause immense damage to users' devices and personal data, including data theft, financial fraud, malware infections, ransomware attacks, and rootkit vulnerabilities. As a result, it is crucial for smartphone users to take precautions to spot these fake spyware apps and protect themselves from potential harm.

Cyberattack on Ntt Reveals Weaknesses in Global Telecommunications Infrastructure Δ1.74

NTT Communications has suffered a devastating cyberattack that compromised sensitive data of almost 18,000 corporate customers. The breach occurred in late February and saw the theft of key customer information, including contract numbers, names, contact details, and service usage records. NTT has acknowledged the breach but remains tight-lipped about the identity of the attackers or how they accessed its systems.

Google Still Faces Chrome Sell-Off: A National Security Conundrum Δ1.74

The US Department of Justice (DOJ) continues to seek a court order for Google to sell off its popular browser, Chrome, as part of its effort to address allegations of search market monopoly. The DOJ has the backing of 38 state attorneys general in this bid, with concerns about the impact on national security and freedom of competition in the marketplace. Google has expressed concerns that such a sale would harm the American economy, but an outcome is uncertain.

BadBox Malware Hit After Infecting Over 500,000 Android Devices Δ1.74

Cybersecurity experts have successfully disrupted the BadBox 2.0 botnet, which had compromised over 500,000 low-cost Android devices by removing numerous malicious apps from the Play Store and sinkholing multiple communication domains. This malware, primarily affecting off-brand devices manufactured in mainland China, has been linked to various forms of cybercrime, including ad fraud and credential stuffing. Despite the disruption, the infected devices remain compromised, raising concerns about the broader implications for consumers using uncertified technology.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.74

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

Google Tells Trump’s DOJ that Forcing a Chrome Sale Would Harm National Security Δ1.74

Google has pushed back against the US government's proposed remedy for its dominance in search, arguing that forcing it to sell Chrome could harm national security. The company claims that limiting its investments in AI firms could also affect the future of search and national security. Google has already announced its preferred remedy and is likely to stick to it.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.74

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

Tech Giant Google Discloses Scale of AI-Generated Terrorism Content Complaints Δ1.74

Google has informed Australian authorities it received more than 250 complaints globally over nearly a year that its artificial intelligence software was used to make deepfake terrorism material, highlighting the growing concern about AI-generated harm. The tech giant also reported dozens of user reports warning about its AI program Gemini being used to create child abuse material. The disclosures underscore the need for better guardrails around AI technology to prevent such misuse.

India's Angel One Says Assessing Impact After Security Breach Δ1.73

Indian stock broker Angel One has confirmed that some of its Amazon Web Services (AWS) resources were compromised, prompting the company to hire an external forensic partner to investigate the impact. The breach did not affect clients' securities, funds, and credentials, with all client accounts remaining secure. Angel One is taking proactive steps to secure its systems after being notified by a dark-web monitoring partner.

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.73

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

5 Easy Browser Tweaks That Secure Your Web Surfing Δ1.73

Modern web browsers offer several built-in settings that can significantly enhance data security and privacy while online. Key adjustments, such as enabling two-factor authentication, disabling the saving of sensitive data, and using encrypted DNS requests, can help users safeguard their personal information from potential threats. Additionally, leveraging the Tor network with specific configurations can further anonymize web browsing, although it may come with performance trade-offs.

Malware Botnet Spreads Across 1.6 Million Android Tvs Δ1.73

The Vo1d botnet has infected over 1.6 million Android TVs, with its size fluctuating daily. The malware, designed as an anonymous proxy, redirects criminal traffic and blends it with legitimate consumer traffic. Researchers warn that Android TV users should check their installed apps, scan for suspicious activity, and perform a factory reset to clean up the device.

Broadcom Releases Fixes for Multiple VMware Security Flaws Δ1.73

Broadcom has released patches for three critical vulnerabilities in its VMware products, which are already being exploited in the wild. The bugs were described as VM escape flaws and affect all supported versions of VMware ESX, vSphere, Cloud Foundation, and Telco Cloud Platform. These issues were deemed severe enough to warrant immediate attention from users, who are urged to apply the fixes as soon as possible.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.73

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks Δ1.73

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.

Accidentally Texting with Scammers? Google's AI Is Here to Stop the Chat Cold Δ1.73

Google has introduced AI-powered features designed to enhance scam detection for both text messages and phone calls on Android devices. The new capabilities aim to identify suspicious conversations in real-time, providing users with warnings about potential scams while maintaining their privacy. As cybercriminals increasingly utilize AI to target victims, Google's proactive measures represent a significant advancement in user protection against sophisticated scams.

More Reports Claim 2024 Was the Worst Year for Ransomware Attacks Yet. Δ1.72

2024 has been marked as a record-breaking year for ransomware attacks, with a 65% increase in detected groups and 44 new malware variants contributing to almost a third of undisclosed attacks. The healthcare, government, and education sectors were disproportionately affected, while emerging groups like LockBit and RansomHub accounted for a significant number of incidents, highlighting the growing sophistication of cybercriminals. As organizations face escalating financial and reputational risks, the need for proactive cybersecurity measures has never been more urgent.