company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

VanHelsing

RaaS

loading..
loading..
loading..

VanHelsing RaaS: 2025’s $5k Cyber Menace Hits 3 Victims

VanHelsing RaaS 2025: $5k Cyber Threat Targets Windows, Linux, ESXi. Double Extortion & Evasion Tactics Exposed. Mitigate Now

24-Mar-2025
4 min read

No content available.

Related Articles

loading..

SSO

Data Leak

Oracle refutes claims of a breach by threat actor rose87168, who alleges selling...

Tech giant Oracle has vehemently denied a data breach after a threat actor, operating under the alias *rose87168*, claimed to infiltrate Oracle Cloud’s federated SSO login servers. The actor allegedly sells 6 million records—including encrypted passwords, Java Keystore (JKS) files, and LDAP data—on the hacking forum BreachForums. In a publicly announced statement, Oracle asserted, _“There has been no breach of Oracle Cloud. The published credentials are not for the Oracle Cloud. No customers experienced a breach or lost data.”_ This rebuttal follows rose87168’s release of sample data and a URL purportedly proving access to Oracle’s `login.us2.oraclecloud.com` server. ### **Timeline of the Alleged Oracle Cloud SSO Breach** 1. **Initial Compromise**: The threat actor claims to have breached Oracle Cloud servers **40 days ago**, exfiltrating data from the US2 and EM2 regions. 2. **Extortion Attempt**: Rose87168 emailed Oracle demanding **100,000 XMR (Monero)**—a privacy-focused cryptocurrency—in exchange for breach details. Oracle reportedly declined, requesting “all information needed for a patch” instead. 3. **Data Sale**: On BreachForums, the actor advertised the sale of encrypted SSO passwords, LDAP hashes, and enterprise manager keys, offering companies a “pay-to-delete” option to remove their data pre-sale. ### **Technical Analysis of the Alleged Oracle Cloud Vulnerability** Rose87168 alleges exploiting a **critical unpatched CVE** (Common Vulnerabilities and Exposures) in Oracle Cloud servers. While the actor claims the flaw lacks a public PoC (Proof of Concept), Oracle has not confirmed the vulnerability’s existence. Key technical points include: - **Encrypted SSO Passwords**: Advertised as decryptable using stolen JKS and key files. - **LDAP Hashes**: Marketed as “crackable” with sufficient computational resources. - **Proof of Access**: A text file uploaded to Oracle’s `login.us2.oraclecloud.com` server, archived on the Internet Archive, was shared as evidence. ### **Oracle’s Response & Counterclaims** Oracle has maintained a firm stance against the breach allegations: - **Denial of Server Access**: The company insists that rose87168’s proof-of-concept URL does not validate access to Oracle Cloud infrastructure. - **Customer Reassurance**: Emphasizing no customer data loss, Oracle dismissed the leaked credentials as unrelated to its cloud services. - **Call for Evidence**: Oracle’s request for full vulnerability details before payment suggests strategic stalling to assess the threat actor’s legitimacy. ### **Extortion Tactics** The threat actor’s campaign employs psychological manipulation to pressure Oracle and its clients: - Highlighting “crackable” passwords and LDAP hashes instills urgency among affected companies. - The “pay-to-delete” scheme preys on organizations’ desire to avoid public scrutiny. - Rose87168 invited hackers to assist in cracking passwords, leveraging collective expertise to escalate the threat.

loading..   24-Mar-2025
loading..   3 min read
loading..

Access Token

Over 20,000 projects affected as Coinbase becomes the main target in a sophistic...

A sophisticated supply chain attack targeting the code-sharing platform [GitHub](https://www.secureblink.com/cyber-security-news/fake-po-c-repositories-and-malicious-code-on-git-hub). Researchers from Palo Alto Unit 42 and Wiz have unveiled a detailed investigation into a multi-phase breach involving [Coinbase](https://www.secureblink.com/cyber-security-news/coinbase-phishing-scam-exploits-trust-in-email-infrastructure-to-hijack-crypto-wallets) as a primary target. ### **Targeting GitHub Actions** GitHub Actions, an automation tool commonly used for Continuous Integration and Continuous Deployment (CI/CD), became the focus of a large-scale, cascading supply chain attack earlier this month. Researchers have pinpointed that Coinbase, one of the largest cryptocurrency exchanges, was among the earliest victims despite claims of no significant damage to its assets. The attack began when malicious code was stealthily injected into the widely-used GitHub Action known as `reviewdog/action-setup@v1`. This action is commonly utilized to automate processes like linting and code review during the development lifecycle. Though the specific method of how the breach occurred remains unclear, its ramifications were far-reaching. ### **A Carefully Orchestrated Infiltration** The malicious code was introduced into `reviewdog/action-setup@v1` in such a way that whenever other GitHub Actions—such as `tj-actions/eslint-changed-files`—called this action, it would cause sensitive secrets and authentication tokens to be dumped into the GitHub Actions logs. For developers and organizations relying on these tools, this posed a severe risk, as those logs contained critical CI/CD secrets. As the breach advanced, attackers used this method to steal a *Personal Access Token* (PAT) from an unsuspecting repository, which was then exploited to push a malicious commit to `tj-actions/changed-files`. This action was part of the malicious chain that targeted Coinbase specifically, along with a user account named *"mmvojwip"*, which was later identified as belonging to the attacker. ### **Targeted Commit and Token Theft** The malicious commit was strategically crafted to target Coinbase’s highly sensitive projects, including `coinbase/agentkit`, a pivotal framework that facilitates interaction between AI agents and blockchain networks. Over 20,000 other projects used the same `tj-actions/changed-files` GitHub Action, increasing the scope of the potential damage. However, it was the timing and execution against Coinbase that highlighted the precision of the attack. On 14 March 2025, just two hours before the main phase of the attack against `tj-actions/changed-files`, the attackers had successfully stolen a GitHub token with *write permissions* to the `coinbase/agentkit` repository. This token, a critical access point, could have enabled them to significantly alter the project. ### **Attack Neutralized** Despite the alarming nature of the breach, Coinbase confirmed through discussions with Palo Alto’s Unit 42 that the attackers were ultimately unsuccessful in causing any tangible damage. The company issued a statement asserting that no assets or code from the `agentkit` project or any other Coinbase resource had been compromised. _“We followed up by sharing more details of our findings with Coinbase, which stated that the attack was unsuccessful at causing any damage to the agentkit project, or any other Coinbase asset,”_ said Unit 42 in their report. The swift action from CoinbaseCoinbase's swift action, coupled with an effective response to mitigate further damage, ensured that the potential for widespread disruption was contained. While Coinbase’s prompt response helped limit the immediate impact, this attack underscores a growing concern over supply chain vulnerabilities in software development. With an increasing number of organizations relying on open-source GitHub Actions, a dependency chain like this presents a ripe opportunity for threat actors. Palo Alto Unit 42 and Wiz’s analysis revealed that while Coinbase was the primary focus, the cascading nature of the attack means it could have been far more widespread. It’s critical for organizations to reevaluate their security protocols, ensuring that actions such as code review and continuous integration are secure, both in terms of the tools they use and the repositories they manage.

loading..   22-Mar-2025
loading..   4 min read
loading..

Games

Info Stealer

Valve pulls malware-laced Steam game after data theft risks, mass PC infections....

Valve Corporation has removed the game Sniper: Phantom's Resolution from its Steam platform after users reported that its demo installer deployed information-stealing malware on their systems. This is the second time in a month that a Steam title has been linked to malicious activity, raising questions about platform security and vetting processes. ### **Suspicious Title and Developer** Developed by *Sierra Six Studios*, *Sniper: Phantom's Resolution* was advertised as an early-access tactical shooter slated for release in early 2024. However, players grew wary when the game’s Steam page featured assets and descriptions seemingly plagiarized from other popular titles. Further red flags emerged when users were instructed to download the demo from an external GitHub repository instead of Steam—a deviation from standard platform protocols. On Wednesday, Sierra Six Studios warned players to avoid third-party downloads, claiming external sources posed _“security risks.”_ Ironically, even users who followed Steam’s official download link received the same malware-laden installer hosted on GitHub. ### **Malware Analysis** Reddit users and cybersecurity enthusiasts dissected the installer, revealing alarming findings. The file, named *Windows Defender SmartScreen.exe*—a title mimicking legitimate Microsoft software—contained multiple attack tools: a privilege escalation utility to gain administrative access, a Node.js wrapper to execute scripts discreetly, and Fiddler, a tool capable of intercepting web traffic and stealing cookies. The malware also employed evasion tactics, such as rapidly terminating Node.js scripts to avoid detection. For persistence, it executed *createShortcut.vbs*, a script adding the malicious executable to the system’s startup tasks. ### **Developer’s Shadowy Footprint** Investigators traced the GitHub repository hosting the installer to an account named *arda1337*, which also hosts cryptocurrency tools and Telegram bot kits—common resources for cybercriminals. GitHub swiftly removed the repository after reports surfaced, and Valve followed suit by delisting the game on Thursday. The developer’s website, *sierrasixstudios[.]dev*, has since gone offline. ### **User Risks & Recommendations** Players who installed the demo are urged to: 1. Immediately uninstall the game. 2. Run full system scans using reputable antivirus software. 3. Monitor accounts for suspicious activity, as stolen cookies and data could enable identity theft or financial fraud. ### **A Recurring Problem for Steam** This incident follows last month’s *PirateFi* controversy, where a game distributed the Vidar infostealer to 1,500 users. Despite Steam’s robust security infrastructure, critics argue that its open submission model allows bad actors to exploit gaps in pre-release vetting. ### **Industry Reactions** Cybersecurity firm *MalwareBytes* tweeted: “This case underscores how attackers weaponize gaming hype. Always verify downloads, even on trusted platforms.” Meanwhile, Valve has yet to issue a public statement on its review process. ### **Broader Implications** The incident highlights growing concerns about malware distribution via legitimate platforms. As cybercriminals increasingly target gamers—a demographic often granted high system permissions—experts advise vigilance and multi-layered security measures.

loading..   22-Mar-2025
loading..   3 min read