company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Access Token

loading..
loading..
loading..

20,000 Projects Impacted Coinbase Targeted in Massive GitHub Attack

Over 20,000 projects affected as Coinbase becomes the main target in a sophisticated GitHub Actions supply chain attack. Learn how the breach unfolded and its i...

22-Mar-2025
4 min read

No content available.

Related Articles

loading..

SSO

Data Leak

Oracle refutes claims of a breach by threat actor rose87168, who alleges selling...

Tech giant Oracle has vehemently denied a data breach after a threat actor, operating under the alias *rose87168*, claimed to infiltrate Oracle Cloud’s federated SSO login servers. The actor allegedly sells 6 million records—including encrypted passwords, Java Keystore (JKS) files, and LDAP data—on the hacking forum BreachForums. In a publicly announced statement, Oracle asserted, _“There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No customers experienced a breach or lost data.”_ This rebuttal follows rose87168’s release of sample data and a URL purportedly proving access to Oracle’s `login.us2.oraclecloud.com` server. ### **Timeline of the Alleged Oracle Cloud SSO Breach** 1. **Initial Compromise**: The threat actor claims to have breached Oracle Cloud servers **40 days ago**, exfiltrating data from the US2 and EM2 regions. 2. **Extortion Attempt**: Rose87168 emailed Oracle demanding **100,000 XMR (Monero)**—a privacy-focused cryptocurrency—in exchange for breach details. Oracle reportedly declined, requesting “all information needed for a patch” instead. 3. **Data Sale**: On BreachForums, the actor advertised the sale of encrypted SSO passwords, LDAP hashes, and enterprise manager keys, offering companies a “pay-to-delete” option to remove their data pre-sale. ### **Technical Analysis of the Alleged Oracle Cloud Vulnerability** Rose87168 alleges exploiting a **critical unpatched CVE** (Common Vulnerabilities and Exposures) in Oracle Cloud servers. While the actor claims the flaw lacks a public PoC (Proof of Concept), Oracle has not confirmed the vulnerability’s existence. Key technical points include: - **Encrypted SSO Passwords**: Advertised as decryptable using stolen JKS and key files. - **LDAP Hashes**: Marketed as “crackable” with sufficient computational resources. - **Proof of Access**: A text file uploaded to Oracle’s `login.us2.oraclecloud.com` server, archived on the Internet Archive, was shared as evidence. ### **Oracle’s Response & Counterclaims** Oracle has maintained a firm stance against the breach allegations: - **Denial of Server Access**: The company insists that rose87168’s proof-of-concept URL does not validate access to Oracle Cloud infrastructure. - **Customer Reassurance**: Emphasizing no customer data loss, Oracle dismissed the leaked credentials as unrelated to its cloud services. - **Call for Evidence**: Oracle’s request for full vulnerability details before payment suggests strategic stalling to assess the threat actor’s legitimacy. ### **Extortion Tactics** The threat actor’s campaign employs psychological manipulation to pressure Oracle and its clients: - Highlighting “crackable” passwords and LDAP hashes instills urgency among affected companies. - The “pay-to-delete” scheme preys on organizations’ desire to avoid public scrutiny. - Rose87168 invited hackers to assist in cracking passwords, leveraging collective expertise to escalate the threat.

loading..   24-Mar-2025
loading..   3 min read
loading..

RaaS

VanHelsing

VanHelsing RaaS 2025: $5k Cyber Threat Targets Windows, Linux, ESXi. Double Exto...

A new emerging ransomware-as-a-service (RaaS) operation, dubbed *VanHelsing*, has rapidly escalated cybersecurity concerns globally after compromising three high-profile victims within weeks of its launch on 7 March 2025. Security researchers at Check Point warn that the group’s sophisticated tools, affiliate-driven model, and cross-platform capabilities position it as a formidable threat to businesses and governments. The emergence of VanHelsing coincides with a broader surge in ransomware attacks, with February 2025 marking the worst month in history for such incidents, according to cybersecurity firm Bitdefender. VanHelsing’s RaaS model democratizes cybercrime by allowing seasoned hackers and newcomers to participate for a $5,000 deposit, which is waived for affiliates with proven reputations. Affiliates retain 80% of ransom payments, while the operators pocket 20%, incentivizing rapid adoption. The group explicitly prohibits attacks on the Commonwealth of Independent States (CIS), a common tactic among cybercriminal syndicates to avoid retaliation from Russia-aligned hacking collectives. Check Point’s report highlights VanHelsing’s “user-friendly” control panel, which supports desktop and mobile devices—even featuring dark mode—and enables affiliates to target Windows, Linux, BSD, Arm, and ESXi systems. The ransomware employs a double extortion strategy, stealing sensitive data before encrypting files and appending the “.vanhelsing” extension. Victims receive a ransom note demanding Bitcoin payments, while their desktop wallpapers are altered to amplify psychological pressure. The C++-based malware also deletes shadow copies to hinder system recovery. It uses command-line arguments to customize attacks, such as spreading to SMB servers or operating in “Silent” mode to delay file renaming. CYFIRMA reports that government agencies, pharmaceutical firms, and manufacturers in France and the U.S. have fallen prey to the group. ### **Cross-Platform Attacks & Exploited Vulnerabilities** VanHelsing’s rise mirrors a broader shift in ransomware tactics. New variants of *Albabat* ransomware now target Linux and macOS systems. In contrast, *BlackLock*—a rebranded version of the notorious Eldorado ransomware—has become one of 2025’s most active RaaS groups, focusing on technology, finance, and retail sectors. BlackLock recruits “traffers” to deploy malicious pages that infect victims with malware, enabling initial access for follow-up attacks. Meanwhile, the *SocGholish* framework (aka FakeUpdates) is being leveraged to distribute *RansomHub* ransomware, attributed to the threat group Water Scylla. Critical vulnerabilities in Fortinet firewall appliances (CVE-2024-55591 and CVE-2025-24472) are also being exploited by a threat actor known as *Mora_001* to deploy *SuperBlack*, a modified version of LockBit 3.0 equipped with custom data exfiltration tools. Simultaneously, the *Babuk2* group is recycling data from past breaches linked to RansomHub and LockBit to issue fake extortion demands, capitalizing on victims’ fears of reputational damage. ### **Remote Encryption & Record-Breaking Attacks** Bitdefender’s data reveals ransomware hit a historic peak in February 2025, with 962 victims publicly listed—a 126% increase from February 2024. The Cl0p RaaS group alone claimed 335 victims, underscoring the scalability of the RaaS ecosystem. Sophos reports a 50% year-over-year surge in remote encryption attacks, where hackers compromise unmanaged devices to encrypt data on domain-joined networks. This trend reflects attackers’ growing focus on exploiting visibility gaps, with remote encryption incidents rising 141% since 2022. _“Remote encryption is now a standard tool for ransomware groups,”_ said Chester Wisniewski, Sophos’ Global Field CISO. “Cybercriminals are aggressively targeting blind spots in corporate networks, often using unsecured endpoints as entry points. Organisations must prioritise comprehensive monitoring to detect suspicious file activity before it escalates.” ### **Mitigation Strategies for Businesses** Experts urge organizations to adopt proactive defences, including patching known vulnerabilities like those in Fortinet appliances, enforcing network segmentation, and maintaining offline backups. Endpoint detection and response (EDR) tools are critical for identifying anomalies, particularly in SMB traffic and remote encryption attempts. Employee training to recognize phishing and social engineering tactics remains vital, as groups like BlackLock increasingly rely on “traffers” to lure victims. The importance of threat intelligence sharing has been recognised. Businesses are advised to monitor for indicators of compromise (IoCs) such as the “.vanhelsing” extension, Bitcoin wallet addresses linked to VanHelsing, and unexpected desktop wallpaper changes. Collaboration with cybersecurity firms and government agencies is also recommended to stay ahead of evolving tactics. As ransomware groups refine their strategies—prioritising cross-platform compatibility, rebranding, and exploiting unpatched vulnerabilities—the VanHelsing operation exemplifies the growing sophistication of cybercrime. With frequent updates and a polished interface, VanHelsing is poised to attract more affiliates, amplifying its global impact. For businesses, the stakes have never been higher: holistic visibility, zero-trust frameworks, and rapid incident response are no longer optional but essential to surviving the ransomware era.

loading..   24-Mar-2025
loading..   4 min read
loading..

Games

Info Stealer

Valve pulls malware-laced Steam game after data theft risks, mass PC infections....

Valve Corporation has removed the game Sniper: Phantom's Resolution from its Steam platform after users reported that its demo installer deployed information-stealing malware on their systems. This is the second time in a month that a Steam title has been linked to malicious activity, raising questions about platform security and vetting processes. ### **Suspicious Title and Developer** Developed by *Sierra Six Studios*, *Sniper: Phantom's Resolution* was advertised as an early-access tactical shooter slated for release in early 2024. However, players grew wary when the game’s Steam page featured assets and descriptions seemingly plagiarized from other popular titles. Further red flags emerged when users were instructed to download the demo from an external GitHub repository instead of Steam—a deviation from standard platform protocols. On Wednesday, Sierra Six Studios warned players to avoid third-party downloads, claiming external sources posed _“security risks.”_ Ironically, even users who followed Steam’s official download link received the same malware-laden installer hosted on GitHub. ### **Malware Analysis** Reddit users and cybersecurity enthusiasts dissected the installer, revealing alarming findings. The file, named *Windows Defender SmartScreen.exe*—a title mimicking legitimate Microsoft software—contained multiple attack tools: a privilege escalation utility to gain administrative access, a Node.js wrapper to execute scripts discreetly, and Fiddler, a tool capable of intercepting web traffic and stealing cookies. The malware also employed evasion tactics, such as rapidly terminating Node.js scripts to avoid detection. For persistence, it executed *createShortcut.vbs*, a script adding the malicious executable to the system’s startup tasks. ### **Developer’s Shadowy Footprint** Investigators traced the GitHub repository hosting the installer to an account named *arda1337*, which also hosts cryptocurrency tools and Telegram bot kits—common resources for cybercriminals. GitHub swiftly removed the repository after reports surfaced, and Valve followed suit by delisting the game on Thursday. The developer’s website, *sierrasixstudios[.]dev*, has since gone offline. ### **User Risks & Recommendations** Players who installed the demo are urged to: 1. Immediately uninstall the game. 2. Run full system scans using reputable antivirus software. 3. Monitor accounts for suspicious activity, as stolen cookies and data could enable identity theft or financial fraud. ### **A Recurring Problem for Steam** This incident follows last month’s *PirateFi* controversy, where a game distributed the Vidar infostealer to 1,500 users. Despite Steam’s robust security infrastructure, critics argue that its open submission model allows bad actors to exploit gaps in pre-release vetting. ### **Industry Reactions** Cybersecurity firm *MalwareBytes* tweeted: “This case underscores how attackers weaponize gaming hype. Always verify downloads, even on trusted platforms.” Meanwhile, Valve has yet to issue a public statement on its review process. ### **Broader Implications** The incident highlights growing concerns about malware distribution via legitimate platforms. As cybercriminals increasingly target gamers—a demographic often granted high system permissions—experts advise vigilance and multi-layered security measures.

loading..   22-Mar-2025
loading..   3 min read