company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Clop Ransomware

loading..
loading..
loading..

Hackers Demand $50 Million in Mass Extortion Attack Targeting Unpatched Systems

Clop hackers demand $50M in Oracle EBS breach. Oracle confirms unpatched July 2025 flaws are the entry point. Patch now.

03-Oct-2025
4 min read

No content available.

Related Articles

loading..

Salesforce

A cybercrime alliance tied to Lapsus$, Scattered Spider, and ShinyHunters is pre...

A new dark‑web leak site branded Scattered [LAPSUS$](https://www.secureblink.com/cyber-security-news/lapsus-hackers-elevate-sim-swapping-attacks-to-unprecedented-heights) Hunters is threatening to dump roughly a billion records allegedly stolen from companies using Salesforce, a pressure tactic typical of modern data‑extortion operations rather than encryption‑based ransomware. Multiple enterprises have acknowledged recent Salesforce‑adjacent data theft, while [Salesforce](https://www.secureblink.com/cyber-security-news/salesforce-zero-day-exploited-to-phish-facebook-credentials) maintains there’s no evidence of a platform‑level compromise, aligning with reports that attackers targeted customers via social engineering and OAuth abuse, not a direct Salesforce breach. The numbers are designed for shock value; the operational core is credentialed API access obtained through vishing and connected‑app authorization flows that grant durable exfiltration capability. ### New alliance: brand fusion, tactics convergence Evidence points to a coordinated alliance blending Lapsus$, Scattered Spider, and [ShinyHunters](https://www.secureblink.com/cyber-security-news/1-1-m-affected-in-allianz-life-data-breach-via-social-engineering) into a single extortion machine that markets itself loudly, moves quickly, and leverages pooled playbooks: social engineering for initial access, OAuth for durable tokens, and public‑facing leak theater for leverage. Public monitoring shows Telegram activity explicitly merging these brands, with a shared narrative that Scattered Spider specializes in initial access while ShinyHunters executes exfiltration and data dumps, echoing their advertised “shinysp1d3r” operations and joint claims tied to Salesforce and other SaaS ecosystems. Third‑party threat profiles and incident recaps corroborate a mid‑2025 surge targeting Salesforce tenants across major enterprises, consistent with this merged identity. ### Why this works: trust edges, not zero‑days This campaign preys on trust junctions in SaaS identity, not exotic exploits: a phone call to a help desk, a plausible app name, and a legitimate OAuth flow that converts a moment of social trust into long‑lived API access. Desktop‑style OAuth and connected‑app experiences can be impersonated or repackaged to appear as standard Salesforce tooling (e.g., “Data Loader”), tricking staff into authorizing scopes like refresh_token + full that enable persistent bulk extraction with minimal noise. This turns traditional perimeter and endpoint controls into bystanders; once a connected app is authorized, the attacker is “inside” through sanctioned API pathways until the token is revoked and the app is pruned. ### Exfil Blueprint Incident forensics from multiple vendors describes a repeatable chain: vishing to the connected‑apps page, user‑supplied verification code, app authorization, and then scripted REST or bulk API queries that sweep high‑value objects at scale. Threat hunters have observed iterative testing with small chunk sizes before pivoting to full‑table pulls, and app aliases like “My Ticket Portal” to match the social pretext, allowing attackers to blend into operational noise until export volumes spike. Event Monitoring and REST API logs reveal patterned queries against PII‑rich objects with per‑request payloads in the megabytes, a signature that becomes obvious with the right telemetry but invisible without it. ### Extortion The leak‑site model operationalizes marketing: timers, victim lists, and public taunts amplify pressure while letting groups walk back into the shadows when it suits their private negotiations. Analysts note that these crews have shifted to selective media use—public enough to validate credibility, private enough to optimize ransom yield—making the “shutdown and reappear” cycles part of the business model rather than a sign of weakness. The Salesforce‑specific branding is a force multiplier, collapsing dozens of discreet tenant incidents into one narrative that helps drive larger payouts and faster executive attention. ### Misconceptions that can sink a response - “Platform breach” vs. tenant compromise: Reports and statements consistently indicate abuse of tenant‑level trust and identity flows, not a Salesforce core vulnerability, which changes the remediation locus from vendor patching to customer identity and app governance. - “MFA solves this”: MFA reduces risk but does not stop a user from consenting to a malicious connected app; OAuth consent with high‑privilege scopes can outflank strong authentication if help‑desk workflows are not hardened. - “If there’s no encryption ransomware, impact is limited”: Data theft alone can trigger regulatory exposure, customer churn, and downstream fraud; operational resilience does not equal privacy resilience. ### Make‑or‑break controls - OAuth and connected‑app governance: Inventory, alert, and gate app creation and authorization events; flag apps with elevated scopes and ambiguous names; enforce reviews for Data Loader‑like tools and restrict to managed, signed binaries. - Event Monitoring and anomaly detection: Continuously watch for API query bursts, unusual object access, sudden increases in data export sizes, and new app authorizations, using Event Monitoring logs as the primary signal source. - Help desk and user verification: Script defenses against vishing—no codes over the phone, out‑of‑band verification for any app authorization, and tight playbooks that treat connected‑app approvals as security‑sensitive changes. ### Break the kill chain: high‑impact, low‑friction steps - Enforce IP ranges and network‑based access policies for administrative sessions and high‑risk actions, reducing the surface for remote OAuth abuse to succeed unnoticed. - Minimize and rotate API keys and integration users, review automated data export jobs, and adhere strictly to least privilege for both humans and non‑human identities connected to Salesforce. - Monitor for unreviewed package installs and scope elevation events; alert when apps request refresh_token or full API access, and quarantine suspect apps pending review and forensic validation. ### SaaS sprawl meets identity debt The Salesforce wave underscores a broader SaaS security problem: sprawling connected apps, unattended machine identities, and permissive scopes create an identity debt that adversaries monetize via phone‑based persuasion rather than code execution. Training and MFA help, but durable fixes require continuous, identity‑aware monitoring across SaaS estates and controls that make “consent” a governed process, not a casual click. Expect copycats to transpose this playbook to other high‑value SaaS platforms where connected apps and delegated access are ubiquitous. This campaign is not about a novel exploit; it is about industrialized persuasion weaponizing OAuth trust to convert a polite phone call into a high‑bandwidth data siphon, then monetizing the haul via sophisticated extortion theater. Organizations that treat connected‑app governance, Event Monitoring, and help‑desk hardening as first‑class controls will deflate the business model behind the “billion records” headline, while those relying on traditional perimeter thinking will remain easy marks for the next branded leak countdown.

loading..   04-Oct-2025
loading..   6 min read
loading..

GitLab

Red Hat's GitLab breach exposes customer network blueprints, posing a widespread...

A cyberattack on Red Hat's consulting division stole sensitive customer documents containing network configurations and credentials, creating potential downstream security risks for thousands of organisations. ## Incident Overview Red Hat, the open-source software giant now owned by IBM, has confirmed a significant security breach. The incident involved unauthorized access to a self-managed **GitLab instance** used exclusively by its internal **Red Hat Consulting** team . Upon detecting the intrusion, Red Hat's security team took action by removing the threat actor's access, isolating the compromised instance, and launching an investigation . The company has stated that the breach is contained and does not impact its core products or software supply chain . ## Scope of the Data Breach A cybercrime group calling itself **"Crimson Collective"** has claimed responsibility for the attack. While Red Hat has confirmed data was copied, it has not verified the attackers' specific claims . The table below summarizes the key details of the stolen data based on public claims and Red Hat's statements: | Aspect | Details | | :--- | :--- | | **Claimed Data Volume** | Nearly **570 GB** of compressed data . | | **Claimed Repositories** | Approximately **28,000** internal development repositories . | | **Key Data Type** | Roughly **800 Customer Engagement Reports (CERs)** from 2020-2025 . | | **Red Hat's Confirmation** | The instance housed consulting data like project specs, code snippets, and internal communications . | ## Understanding Customer Engagement Reports (CERs) The most significant threat from this breach stems from the exposure of Customer Engagement Reports (CERs). These are not standard marketing documents but **detailed technical and architectural blueprints** created by Red Hat's consultants . According to cybersecurity advisories and analysis, these CERs can contain : - **Infrastructure details:** Comprehensive network topologies and system configurations. - **Authentication tokens and keys:** Credentials that could grant access to customer systems. - **Configuration data:** Sensitive settings for platforms and applications. The Centre for Cybersecurity Belgium (CCB) has assessed this breach as a **"high risk"** because this information could be weaponized to breach customer networks directly . The stolen data allegedly pertains to a wide range of high-profile organizations, including telecoms, financial institutions, and government agencies . ## Essential Steps for Potential Impacted Organisations If your organisation is or has been a Red Hat Consulting customer, you should take immediate proactive measures. The following checklist outlines critical actions to protect your environment. ![deepseek_mermaid_20251003_d8a99a.png](https://sb-cms.s3.ap-south-1.amazonaws.com/deepseek_mermaid_20251003_d8a99a_b41f12958c.png) ## Ongoing Investigation Key details about the breach remain unclear, leaving customers with unresolved concerns: - **Initial Access Vector:** The specific vulnerability or method the attackers used to breach the GitLab instance has not been disclosed . - **Dwell Time:** It is unknown how long the attackers had access to the system before detection. The hackers claim the intrusion occurred roughly two weeks before Red Hat's announcement . - **Extortion Demands:** Crimson Collective has stated it is an "extortion ransomware group" . Red Hat has not commented on whether it received or is negotiating with any extortion demands. ## Responsible Reporting This incident highlights the sophisticated threats facing software supply chains and the critical importance of securing development and collaboration environments. Red Hat's core product integrity remains intact, but the breach shows that **attack surfaces extend beyond code to include internal documents and communications** . It is also crucial to note that **GitLab's own platform and infrastructure were not compromised** . This incident involved Red Hat's self-managed instance of GitLab Community Edition, for which the customer is responsible for security, maintenance, and applying patches . This is a developing story. As the investigation continues, more specific guidance for affected customers is expected from Red Hat. For the latest official information, monitor the **[Red Hat security blog](https://access.redhat.com/articles/7132207)** .

loading..   03-Oct-2025
loading..   3 min read
loading..

Deepfake

Telecom

Near-monthly breaches rocked South Korea in 2025—deepfakes, rogue base stations,...

South Korea’s world-class internet and tech prowess collided with a relentless wave of near-monthly cyber incidents in 2025, exposing a reactive, fragmented defense posture unfit for a nation at the core of global digital supply chains. From telecom giants and financial institutions to government-adjacent targets, the impacts were sweeping—forcing an urgent rethink at the highest levels of power. ### Key revelations - A near-monthly drumbeat of major incidents spotlighted systemic coordination gaps and the absence of a clear cyber “first responder,” amplifying risk across critical sectors. - Experts warned that reactive governance, siloed agencies, and a deep talent shortage created a vicious cycle where quick fixes replaced durable resilience. - A late-year pivot toward interagency centralization from the presidential office aims to accelerate response—while raising new debates over oversight and accountability. ### 2025 timeline at a glance - January: GS Retail breach exposed about 90,000 customers’ personal data after sustained website attacks straddling the New Year period. - February: Wemix (Wemade) lost $6.2 million to a hack on Feb. 28, with disclosure delayed until March, fueling investor anxiety. - April–May: SK Telecom’s mega-breach compromised data for roughly 23 million customers, triggering mass SIM replacements and a protracted fallout. - June: Yes24 was crippled by ransomware on June 9, with services down for days before restoration by mid-month. - July: North Korea–linked Kimsuky used AI-generated deepfake images in spear-phishing against defense-related entities, marking a chilling escalation in tradecraft. - July: Seoul Guarantee Insurance suffered ransomware that paralyzed core guarantee services, stranding customers and markets in uncertainty. - August: Yes24 was hit again; Lotte Card lost around 200GB of data affecting roughly 3 million customers over 17 undetected days; a Welcome Financial affiliate faced Russian-linked claims of over 1TB exfiltration. - September: KT disclosed a breach via illegal “fake base stations,” exposing thousands to IMSI/IMEI capture and unauthorized micro-payments—a first-of-its-kind shock to telecom trust. ### Why the defenses cracked South Korea’s cyber governance spanned multiple ministries and regulators that too often scrambled in parallel, deferring to one another instead of operating as a single, empowered crisis unit. The result was slower containment, mixed messaging, and a pattern of incident-driven fixes rather than systemic hardening aligned to national critical infrastructure priorities. ### Expert Alarm Industry leaders argue the nation treats cybersecurity as episodic crisis management, not as a cornerstone of national resilience, starving long-term investments in architecture and skills. The chronic shortage of trained defenders compounds exposure—without skilled talent, proactive defenses and sustained threat hunting simply cannot scale. ### A government pivot Responding to the compounding shocks, the National Security Office advanced a “comprehensive” interagency cyber plan led from the presidential office to cut through silos and accelerate incident response. Regulators also signaled new legal powers to investigate at the first hint of compromise—even absent a company report—to finally close the first-responder gap. ### Oversight Debate Central control promises speed, but concentrating authority risks politicization and overreach if not paired with independent checks, experts caution. A hybrid model—central strategy and crisis coordination with technical execution by specialist agencies like KISA under clearer rules—emerges as the balanced path forward. ### Threats redefining the battlefield - AI-powered deception: Kimsuky’s deepfake military IDs supercharge spear-phishing, fusing social engineering with synthetic media to breach high-trust environments. - Telecom edge abuse: From mass data theft at SK Telecom to KT’s rogue base-station exploitation, attackers are increasingly weaponizing the seams between IT, subscriber identity, and network access. - Ransomware resiliency gaps: Repeat hits against Yes24 and disruptive attacks on financial rails like SGI reveal operational weak points and recovery shortfalls under sustained pressure. ### What must change now - Establish a single operational first responder with clear legal authority to coordinate, compel action, and communicate consistently across ministries and sectors in real time. - Fund workforce pipelines and retainers for surge capacity, ending the quick-fix cycle and enabling continuous threat hunting and architecture hardening in telecom and finance. - Mandate fast, standardized disclosure and post-incident audits to drive sector-wide learnings and public trust following large-scale breaches.

loading..   02-Oct-2025
loading..   4 min read