Connect with us

Cybersecurity News

ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories

Published

on

This week’s cybersecurity threats highlight a growing trend: attackers don’t always need new exploits—they leverage ordinary tools, trusted workflows, and routine services in the wrong hands. Scale, patience, and misplaced trust often give adversaries more power than speed or spectacle.

Below is a roundup of the most notable incidents and campaigns.


Spear-Phishing Delivers Custom Backdoor

Operation Nomad Leopard targets Afghanistan
Government entities in Afghanistan were hit by a spear-phishing campaign using fake administrative documents to deliver a backdoor named FALSECUB via a GitHub-hosted ISO. The ISO contained a .LNK file to display the lure PDF and execute the C++ payload. Detected in December 2025, the attack appears low-to-moderate sophistication.


DoS Attacks Disrupt UK Services

Russian-aligned hacktivists continue targeting critical systems
Groups like NoName057(16) launched DoS attacks on UK government and local services. While technically simple, these attacks can cause significant disruption, forcing organizations to expend resources on mitigation and recovery.


Trusted Apps Used to Load Malicious DLLs

DLL Side-Loading Infostealer Campaign
Malware disguised as legitimate applications (e.g., “Malwarebytes installers”) used DLL side-loading to deploy secondary-stage information stealers. The malicious DLL, CoreMessaging.dll, executes without triggering suspicion.


Windows Subsystem for Linux (WSL) Exploited

SpecterOps released a Beacon Object File (BOF) to interact with WSL via COM services without spawning wsl.exe, enabling attackers to execute commands across installed distributions.


Ads Push Covert RAT Installers

Malicious ads for file converters like Easy2Convert and ConvertyFile distribute persistent .NET RATs while delivering legitimate functionality in the foreground.


Short-Lived TLS Certificates Now Available

Let’s Encrypt rolls out 6-day certificates for operators with automated renewal systems. Opt-in only; not default.


Support Systems Abused for Spam

Zendesk warns of relay spam
Attackers exploit unverified ticket submissions to send spam through automated confirmation emails. Organizations are advised to restrict ticket submissions to verified users.


EU Proposes Cybersecurity Rules for High-Risk Suppliers

The European Commission seeks to remove high-risk suppliers from telecom networks and critical ICT supply chains. The updated Cybersecurity Act includes harmonized, risk-based mitigation measures and a renewed European Cybersecurity Certification Framework (ECCF).


Large-Scale WordPress Plugin Recon

GreyNoise detects scans targeting 706 plugins
Over 40,000 events, primarily targeting Post SMTP, Loginizer, LiteSpeed Cache, and Elementor. Users are urged to update plugins promptly.


Rust Crates Security Enhancements

Crates.io adds a “Security” tab showing advisories from RustSec and supports Trusted Publishing to prevent unauthorized package uploads.


Chinese C2 Servers Skyrocket

Hunt.io finds 18,000+ active C2 servers in China
Nearly half hosted by China Unicom; others by Alibaba Cloud and Tencent. Servers support IoT botnets (Mozi), Cobalt Strike, VShell, and Mirai operations.


Military-Linked Espionage Case in Sweden

A former IT consultant for Sweden’s Armed Forces was detained for allegedly passing information to Russia, suspected to have occurred since 2022.


Supply-Chain Platform Vulnerabilities

Bluvoyix flaws (CVE-2026-22236 to CVE-2026-22240) allowed full admin access to customer accounts, shipments, and APIs. Patches have been applied.


Crypto Scams Hit Record Levels

$17B estimated stolen in 2025 via scams like pig-butchering and impersonation attacks. AI-generated deepfakes and sophisticated money-laundering infrastructure amplify the impact.


ATM Malware Ring Dismantled

Five Venezuelan nationals plead guilty to ATM jackpotting attacks in the U.S., deploying malware and exploiting supervisor mode.


Pixel Zero-Click Exploit

CVE-2025-54957 and CVE-2025-36934 chain allows arbitrary code execution and kernel escalation via Dolby audio decoder on Google Pixel 9. Patched January 2026.


Malvertising Campaigns Deliver Infostealers

  • TamperedChef: PDF editor trojan via Google Ads, targets Germany, UK, and France.
  • PureLogs Stealer: Embedded Base64 payloads in PNG images via phishing campaigns using fake pharma invoices.

Loan and Software Scams

  • Fake loan offers in Peru harvest banking credentials.
  • Fake Notepad++ installers in South Korea deliver proxyware for monetizing bandwidth.

Key Takeaways

The “background layer” of technology—the systems and workflows users trust—has become the frontline of attacks. Exploitation is often silent, accumulating risk until it surfaces. The pattern: ordinary tools, scaled access, and low friction can yield disproportionate control.

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2023 Cyber Reports Cyber Security News All Rights Reserved Website by Top Search SEO