company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

NPM

loading..
loading..
loading..

Sophisticated npm Attack Infects Legitimate Packages with Persistent Reverse Shell Backdoors, Researchers Warn

Sophisticated npm Attack Infects Legitimate Packages with Persistent Reverse Shell Backdoors, Researchers Warn

26-Mar-2025
3 min read

No content available.

Related Articles

loading..

DNA

Genetics

23andMe files Ch.11 bankruptcy, asset sale risks 15M users' DNA data. Urgent pri...

23andMe, the pioneering genetic testing company that brought DNA analysis to millions of living rooms, filed for Chapter 11 bankruptcy protection on Sunday, capping years of financial turbulence. The move triggers a high-stakes auction of its assets—including one of the world’s largest troves of consumer genetic data—raising urgent questions about the fate of sensitive health and ancestry information belonging to 15 million users. ### **What Chapter 11 Means for Your DNA** Chapter 11 bankruptcy allows companies to restructure debts while continuing operations, but 23andMe’s decision to sell its assets complicates the process. Under U.S. law, customer data is classified as a corporate asset unless explicitly protected. While 23andMe claims genetic information will remain secure, privacy experts warn that new owners could exploit loopholes to monetize or mishandle data. The company [rejected](https://investors.23andme.com/news-releases/news-release-details/23andme-initiates-voluntary-chapter-11-process-maximize) a bid from co-founder and outgoing CEO Anne Wojcicki, who resigned to participate as an independent bidder. _“The board determined a competitive auction maximizes value for stakeholders,”_ said Chair Mark Jensen in a statement. ### **A History of Breaches and Broken Trust** The bankruptcy filing follows a catastrophic year for 23andMe’s reputation. In 2023, hackers accessed 6.4 million user profiles via credential-stuffing attacks, stealing ancestry reports, health predispositions, and family tree links. The breach exposed raw genotype data—a digital blueprint of users’ DNA—which cybersecurity firm HackMitigation called “a goldmine for foreign actors or insurance fraud.” **Samantha Cole, a 32-year-old breach victim**, told, _“I trusted them with my most personal information. Now I’m terrified it could end up in the hands of some hedge fund or worse.”_ 23andMe settled a class-action lawsuit for $30 million in September 2024 but faces ongoing scrutiny. Critics slammed the company for quietly amending its Terms of Use post-breach to force disputes into arbitration, a move Consumer Advocacy Group CEO Laura Chen called _“a betrayal of users’ rights.” _ ### **Regulators Sound the Alarm** **California Attorney General Rob Bonta** issued an urgent consumer alert Monday, urging users to delete data and revoke research permissions. _“Your DNA isn’t just yours—it’s your family’s. Take action now,”_ the alert stated, providing step-by-step deletion instructions (*see graphic*). **In the UK**, the Information Commissioner’s Office (ICO) warned that GDPR rules still bind 23andMe, requiring _“explicit consent”_ for data transfers. _“Genetic information is uniquely identifiable and immutable. Its exposure could have lifelong consequences,”_ said ICO Deputy Commissioner Stephen Bonner. ### **How to Protect Your Data** 1. **Delete Your Profile**: - Log into 23andMe → Settings → *Permanently Delete Data* → Confirm via email. - **Note**: Deletion may take 30 days. 2. **Destroy Your Sample**: - Email requests@23andme.com to demand destruction of stored saliva samples. 3. **Opt Out of Research**: - Navigate to *Privacy Preferences* → Toggle off “Consent to Research.” *[Infographic Suggestion: Embed a visual guide to data deletion with screenshots.]* ### **Who Owns Your Genes?** The crisis spotlights a gap in U.S. biometric privacy laws. Unlike the EU’s GDPR, which treats genetic data as “sensitive” and restricts its sale, U.S. regulations lack explicit safeguards for DNA. _“This isn’t a spreadsheet leak—this is your biological code,”_ said Dr. Alicia Torres, a bioethicist at MIT. _“Companies treat DNA like a commodity, but morally, it should belong solely to the individual.”_

loading..   29-Mar-2025
loading..   3 min read
loading..

SSO

Data Leak

Oracle refutes claims of a breach by threat actor rose87168, who alleges selling...

Tech giant Oracle has vehemently denied a data breach after a threat actor, operating under the alias *rose87168*, claimed to infiltrate Oracle Cloud’s federated SSO login servers. The actor allegedly sells 6 million records—including encrypted passwords, Java Keystore (JKS) files, and LDAP data—on the hacking forum BreachForums. In a publicly announced statement, Oracle asserted, _“There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No customers experienced a breach or lost data.”_ This rebuttal follows rose87168’s release of sample data and a URL purportedly proving access to Oracle’s `login.us2.oraclecloud.com` server. ### **Timeline of the Alleged Oracle Cloud SSO Breach** 1. **Initial Compromise**: The threat actor claims to have breached Oracle Cloud servers **40 days ago**, exfiltrating data from the US2 and EM2 regions. 2. **Extortion Attempt**: Rose87168 emailed Oracle demanding **100,000 XMR (Monero)**—a privacy-focused cryptocurrency—in exchange for breach details. Oracle reportedly declined, requesting “all information needed for a patch” instead. 3. **Data Sale**: On BreachForums, the actor advertised the sale of encrypted SSO passwords, LDAP hashes, and enterprise manager keys, offering companies a “pay-to-delete” option to remove their data pre-sale. ### **Technical Analysis of the Alleged Oracle Cloud Vulnerability** Rose87168 alleges exploiting a **critical unpatched CVE** (Common Vulnerabilities and Exposures) in Oracle Cloud servers. While the actor claims the flaw lacks a public PoC (Proof of Concept), Oracle has not confirmed the vulnerability’s existence. Key technical points include: - **Encrypted SSO Passwords**: Advertised as decryptable using stolen JKS and key files. - **LDAP Hashes**: Marketed as “crackable” with sufficient computational resources. - **Proof of Access**: A text file uploaded to Oracle’s `login.us2.oraclecloud.com` server, archived on the Internet Archive, was shared as evidence. ### **Oracle’s Response & Counterclaims** Oracle has maintained a firm stance against the breach allegations: - **Denial of Server Access**: The company insists that rose87168’s proof-of-concept URL does not validate access to Oracle Cloud infrastructure. - **Customer Reassurance**: Emphasizing no customer data loss, Oracle dismissed the leaked credentials as unrelated to its cloud services. - **Call for Evidence**: Oracle’s request for full vulnerability details before payment suggests strategic stalling to assess the threat actor’s legitimacy. ### **Extortion Tactics** The threat actor’s campaign employs psychological manipulation to pressure Oracle and its clients: - Highlighting “crackable” passwords and LDAP hashes instills urgency among affected companies. - The “pay-to-delete” scheme preys on organizations’ desire to avoid public scrutiny. - Rose87168 invited hackers to assist in cracking passwords, leveraging collective expertise to escalate the threat.

loading..   24-Mar-2025
loading..   3 min read
loading..

RaaS

VanHelsing

VanHelsing RaaS 2025: $5k Cyber Threat Targets Windows, Linux, ESXi. Double Exto...

A new emerging ransomware-as-a-service (RaaS) operation, dubbed *VanHelsing*, has rapidly escalated cybersecurity concerns globally after compromising three high-profile victims within weeks of its launch on 7 March 2025. Security researchers at Check Point warn that the group’s sophisticated tools, affiliate-driven model, and cross-platform capabilities position it as a formidable threat to businesses and governments. The emergence of VanHelsing coincides with a broader surge in ransomware attacks, with February 2025 marking the worst month in history for such incidents, according to cybersecurity firm Bitdefender. VanHelsing’s RaaS model democratizes cybercrime by allowing seasoned hackers and newcomers to participate for a $5,000 deposit, which is waived for affiliates with proven reputations. Affiliates retain 80% of ransom payments, while the operators pocket 20%, incentivizing rapid adoption. The group explicitly prohibits attacks on the Commonwealth of Independent States (CIS), a common tactic among cybercriminal syndicates to avoid retaliation from Russia-aligned hacking collectives. Check Point’s report highlights VanHelsing’s “user-friendly” control panel, which supports desktop and mobile devices—even featuring dark mode—and enables affiliates to target Windows, Linux, BSD, Arm, and ESXi systems. The ransomware employs a double extortion strategy, stealing sensitive data before encrypting files and appending the “.vanhelsing” extension. Victims receive a ransom note demanding Bitcoin payments, while their desktop wallpapers are altered to amplify psychological pressure. The C++-based malware also deletes shadow copies to hinder system recovery. It uses command-line arguments to customize attacks, such as spreading to SMB servers or operating in “Silent” mode to delay file renaming. CYFIRMA reports that government agencies, pharmaceutical firms, and manufacturers in France and the U.S. have fallen prey to the group. ### **Cross-Platform Attacks & Exploited Vulnerabilities** VanHelsing’s rise mirrors a broader shift in ransomware tactics. New variants of *Albabat* ransomware now target Linux and macOS systems. In contrast, *BlackLock*—a rebranded version of the notorious Eldorado ransomware—has become one of 2025’s most active RaaS groups, focusing on technology, finance, and retail sectors. BlackLock recruits “traffers” to deploy malicious pages that infect victims with malware, enabling initial access for follow-up attacks. Meanwhile, the *SocGholish* framework (aka FakeUpdates) is being leveraged to distribute *RansomHub* ransomware, attributed to the threat group Water Scylla. Critical vulnerabilities in Fortinet firewall appliances (CVE-2024-55591 and CVE-2025-24472) are also being exploited by a threat actor known as *Mora_001* to deploy *SuperBlack*, a modified version of LockBit 3.0 equipped with custom data exfiltration tools. Simultaneously, the *Babuk2* group is recycling data from past breaches linked to RansomHub and LockBit to issue fake extortion demands, capitalizing on victims’ fears of reputational damage. ### **Remote Encryption & Record-Breaking Attacks** Bitdefender’s data reveals ransomware hit a historic peak in February 2025, with 962 victims publicly listed—a 126% increase from February 2024. The Cl0p RaaS group alone claimed 335 victims, underscoring the scalability of the RaaS ecosystem. Sophos reports a 50% year-over-year surge in remote encryption attacks, where hackers compromise unmanaged devices to encrypt data on domain-joined networks. This trend reflects attackers’ growing focus on exploiting visibility gaps, with remote encryption incidents rising 141% since 2022. _“Remote encryption is now a standard tool for ransomware groups,”_ said Chester Wisniewski, Sophos’ Global Field CISO. “Cybercriminals are aggressively targeting blind spots in corporate networks, often using unsecured endpoints as entry points. Organisations must prioritise comprehensive monitoring to detect suspicious file activity before it escalates.” ### **Mitigation Strategies for Businesses** Experts urge organizations to adopt proactive defences, including patching known vulnerabilities like those in Fortinet appliances, enforcing network segmentation, and maintaining offline backups. Endpoint detection and response (EDR) tools are critical for identifying anomalies, particularly in SMB traffic and remote encryption attempts. Employee training to recognize phishing and social engineering tactics remains vital, as groups like BlackLock increasingly rely on “traffers” to lure victims. The importance of threat intelligence sharing has been recognised. Businesses are advised to monitor for indicators of compromise (IoCs) such as the “.vanhelsing” extension, Bitcoin wallet addresses linked to VanHelsing, and unexpected desktop wallpaper changes. Collaboration with cybersecurity firms and government agencies is also recommended to stay ahead of evolving tactics. As ransomware groups refine their strategies—prioritising cross-platform compatibility, rebranding, and exploiting unpatched vulnerabilities—the VanHelsing operation exemplifies the growing sophistication of cybercrime. With frequent updates and a polished interface, VanHelsing is poised to attract more affiliates, amplifying its global impact. For businesses, the stakes have never been higher: holistic visibility, zero-trust frameworks, and rapid incident response are no longer optional but essential to surviving the ransomware era.

loading..   24-Mar-2025
loading..   4 min read