GBHackers News: Your Top Source for Cybersecurity Insights

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 19, 2025 3 min read

Chinese Threat Actors Operate 2,800 Malicious Domains to Distribute Windows Malware

A sophisticated threat actor, dubbed "SilverFox," has been orchestrating a large-scale malware distribution campaign since at least June 2023, primarily targeting Chinese-speaking users. This group has registered approximately 2,800 malicious domains to facilitate the delivery of Windows malware. The operation includes a variety of malicious tools and tactics designed to evade detection, showcasing the evolving capabilities of cybercriminal organizations.

For further details, refer to the original reports on GBHackers and Cyber Press.

New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users

Cybercriminals are leveraging seemingly innocuous voicemail notifications to distribute malware. A recent phishing campaign impersonating Veeam Software exploits users' trust in enterprise messaging systems by delivering malicious payloads via weaponized WAV audio files. This method capitalizes on the familiarity of users with legitimate voicemail notifications, making it a significant threat.

For additional insights, see GBHackers and Cyber Press.

Phishing Attack

Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets

Infostealers like Lumma are specialized malware variants that routinely exfiltrate sensitive data from compromised systems. This includes session tokens, login credentials, and cryptocurrency wallet information. The stolen data is then sold on underground markets, posing a significant risk to both consumers and enterprises.

For more information, check out GBHackers and Cyber Press.

Lumma Infostealer

New Surge of Crypto-Jacking Hits Over 3,500 Websites

Cybersecurity experts have identified a resurgence in crypto-jacking attacks, which have infected over 3,500 websites with malicious JavaScript miners. This surge marks a notable evolution in tactics used by cybercriminals, indicating a shift back to exploiting web platforms for illicit cryptocurrency mining.

For further reading, refer to GBHackers and Cyber Press.

Crypto-Jacking

Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools

Fancy Bear, designated as APT28, is a sophisticated Russian cyberespionage group known for infiltrating government and military organizations. Recent intelligence reports indicate that they have intensified their operations, utilizing advanced tools to compromise sensitive networks and steal classified information.

For additional context, refer to GBHackers and Cyber Press.

Fancy Bear Hackers

Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials

The Snake Keylogger has surfaced as a threat targeting Turkish businesses, particularly those within the defense and aerospace sectors. This malicious tool evades Windows Defender and employs scheduled tasks to harvest credentials, posing a critical risk to organizational security.

For more details, see GBHackers and Cyber Press.

Snake Keylogger

MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems

The MITRE Corporation has introduced the AADAPT™ framework, designed to catalog and mitigate real-world attacks on digital asset payment technologies. This specialized knowledge base aims to enhance the resilience of digital asset systems against evolving cyber threats.

For additional insights, refer to the original post on GBHackers.

AADAPT Framework
Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers. Explore our services at https://www.gopher.security or contact us for more information on how we can enhance your organization's security posture.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends
React2Shell vulnerability

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends

Critical React2Shell RCE vulnerability exploited by threat actors. Learn about attacker techniques, observed payloads like crypto miners, and how to protect your systems. Read now!

By Divyansh Ingle December 12, 2025 8 min read
Read full article
WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups
WinRAR vulnerability

WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups

CISA flags WinRAR CVE-2025-6218 as actively exploited. Learn about this path traversal flaw and how to protect your systems. Update now!

By Jim Gagnard December 11, 2025 3 min read
Read full article
Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers
malicious VSCode extensions

Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers

Beware of malicious VSCode extensions & device code phishing scams. Learn how these attacks steal credentials, capture screens, and hijack sessions. Protect yourself now!

By Alan V Gutnov December 10, 2025 6 min read
Read full article
PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure
BRICKSTORM malware

PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure

Discover how PRC state actors are using BRICKSTORM malware to gain persistent access via VMware. Learn about its advanced evasion techniques and how to defend your systems. Read now!

By Divyansh Ingle December 9, 2025 3 min read
Read full article