cybersecurity

5269 readers
11 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
1
12
Off-Topic Friday (self.cybersecurity)
submitted 1 day ago by shellsharks to c/cybersecurity
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

2
 
 

Dozens of government and university websites belonging to cities, towns, and public agencies across the country are hosting PDFs promoting AI porn apps, porn sites, and cryptocurrency scams; dozens more have been hit with a website redirection attacks which lead to animal vagina sex toy ecommerce pages, penis enlargement treatments, automatically-downloading Windows program files, and porn.

“Sex xxx video sexy Xvideo bf porn XXX xnxx Sex XXX porn XXX blue film Sex Video xxx sex videos Porn Hub XVideos XXX sexy bf videos blue film Videos Oficial on Instagram New Viral Video The latest original video has taken the internet by storm and left viewers in on various social media platforms ex Videos Hot Sex Video Hot Porn viral video,” reads the beginning of a three-page PDF uploaded to the website of the Irvington, New Jersey city government’s website.

Archive: http://archive.today/tgD57

3
4
5
6
7
8
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

9
10
11
6
Off-Topic Friday (self.cybersecurity)
submitted 1 week ago by shellsharks to c/cybersecurity
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

12
 
 

cross-posted from: https://scribe.disroot.org/post/5953090

Archived version

Here is the original Cisa report: BRICKSTORM Backdoor

...

Chinese hackers are using a strain of malware to attack governments in several countries and maintain long-term access, according to U.S. and Canadian cybersecurity officials.

The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Canadian Centre for Cyber Security published an advisory on Thursday outlining the BRICKSTORM malware based off an analysis of eight samples taken from victim organizations.

...

“BRICKSTORM is a sophisticated and stealthy backdoor malware linked to PRC state-sponsored cyber actors,” said CISA Executive Assistant Director for Cybersecurity Nick Andersen.

The advisory includes indicators of compromise and detections organizations can use to tell if they have been impacted by the campaign involving the malware. The malware is used “for long-term persistence on victim systems,” according to U.S. agencies.

...

The goal of the campaign is to steal valuable intellectual property and sensitive data — with a particular focus on the email inboxes of senior company leaders, according to Mandiant. The company attributed the campaign to a threat actor they previously accused of abusing vulnerabilities in firewall products from tech company Ivanti.

...

13
 
 

Record-Breaking DDoS Attacks Mark 2025 Q3 as Aisuru Botnet Emerges

The Aisuru botnet dominated the DDoS threat landscape in Q3 2025, commanding an army of 1-4 million infected devices and launching unprecedented attacks that peaked at 29.7 Tbps and 14.1 billion packets per second[^1]. Cloudflare's autonomous systems blocked 8.3 million DDoS attacks during the quarter, averaging 3,780 attacks per hour - a 15% increase from Q2 and 40% year-over-year[^1].

The Rise of Aisuru

The botnet targeted telecommunications providers, gaming companies, hosting providers, and financial services, causing widespread Internet disruption even when organizations weren't direct targets[^1]. Parts of Aisuru are now offered as botnets-for-hire, enabling attackers to "inflict chaos on entire nations" for just hundreds to thousands of dollars[^1].

Attack Statistics

  • 1,304 hyper-volumetric attacks in Q3 alone (54% increase from Q2)
  • Attacks over 100 million packets per second up 189%
  • Attacks exceeding 1 Tbps increased 227%
  • 4% of HTTP attacks exceeded 1 million requests per second[^15]

Industry Impacts

DDoS attacks against AI companies surged 347% month-over-month in September 2025, coinciding with increased public concern over AI risks[^1]. The Mining, Minerals & Metals industry jumped 24 spots in target rankings amid EU-China tensions over rare earth minerals and EV tariffs[^1].

Geographic Trends

Indonesia maintained its position as the leading source of DDoS attacks globally, holding the top spot for a full year. The country's share of HTTP DDoS attack traffic has grown by 31,900% since 2021[^1].

Attack Types

UDP floods led network-layer attacks with a 231% quarterly increase, followed by DNS floods, SYN floods, and ICMP floods[^1]. Nearly 70% of HTTP DDoS attacks came from known botnets, with 20% originating from fake or headless browsers[^1].

[^1]: Cloudflare - Cloudflare's 2025 Q3 DDoS threat report
[^15]: Security Affairs - Cloudflare mitigates record 29.7 Tbps DDoS attack by the AISURU botnet

14
 
 

cross-posted from: https://lemmy.zip/post/54305624

Open source React executes malicious code with malformed HTML—no authentication needed.

15
16
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

17
 
 

Over the past week, we've identified and tracked an unprecedented 23 extensions which copy other popular extensions, update after publishing with malware, manipulate download counts, and use KNOWN attack signatures which have been in use for months. Many of these relate to Glassworm malware, but there could be mulitple campaigns at work also.

18
 
 

🎁 Here’s a little end-of-year gift backed with Sightings from Vulnerability-Lookup ! A small step into 2026.

The year is almost over, so we’ve wrapped up a fresh Sightings Forecast — looking at how sightings evolve across social platforms, code repositories, and structured feeds. All monitored through our tools[1] and enriched by our fantastic community[2].

👉 Read the full report:

https://www.vulnerability-lookup.org/2025/12/02/end-of-year-threat-intelligence-sightings-forecast/

The goal: track how sightings evolve over time and provide an adaptive short-term forecast for several key sources monitored by Vulnerability-Lookup.

Our methodology combines weekly historical trends with daily adaptive models. Depending on the underlying slope, we apply either a Logistic Growth model (for rising trends) or an Exponential Decay model (for declining activity).

🔍 Key takeaways

Social platforms like the Fediverse and Bluesky show highly event-driven, volatile patterns, reflecting real-time community discussions.

Structured sources such as MISP Projec, The Shadowserver Foundation, and Nuclei offer more stable and reliable signals, ideal for validated intelligence.

Early detection: Social sources provide fast but noisy signals. Not to ignore.

Reliability: Structured intelligence confirms and contextualizes threats.

Better planning: Adaptive forecasting enables informed prioritization and workload management.

Balanced visibility: Combining heterogeneous sources gives stronger situational awareness.

📚 References

💶🇪🇺 Funding

This work is part of the EU-funded FETTA initiative, strengthening cross-European collaboration on threat intelligence.

https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/how-to-participate/org-details/999999999/project/101128030/program/43152860/details

19
 
 

cross-posted from: https://mander.xyz/post/42887934

Web archive link

The accelerating cyber threats facing Ireland demands “an aggressive response” by the State, according to the country’s cyber bosses.

The National Cyber Security Centre (NCSC) said criminal cyber gangs and hackers, aligned to states like China and Russia, pose a “significant threat” to Ireland’s national security.

This is because Ireland is a host to some of the world’s largest tech providers and cloud computing facilities as well as the worsening geopolitical situation and the threat posed to Europe resulting from Russia’s war of aggression in Ukraine.

The centre said it “regularly observes state-aligned threat actors carrying out scanning and other reconnaissance activities” targeting Irish government and State-owned networks.

...

Publishing its 2025 National Cyber Risk Assessment, the NCSC said Ireland was at risk from cyber attacks on “shared critical infrastructure”, such as gas and electricity pipelines connecting Ireland to the UK and France.

...

20
 
 

cross-posted from: https://mander.xyz/post/42887732

Web archive link

Belgium has joined a growing list of countries banning Chinese generative AI tool DeepSeek from devices used by government officials and public servants after a cybersecurity agency raised concerns.

Federal public administration employees had until Monday to uninstall DeepSeek’s apps from all work devices, according to a note circulated by the ministry and reported in local media.

The minister for public action and modernisation, Vanessa Matz, announced the plan in September after receiving the results of an analysis by the Centre for Cybersecurity Belgium of the use of AI tools in the administration. The ban is preventive, according to the minister.

“Trust in the government rests on fundamental principles of prevention, protection of citizens’ personal data, and cybersecurity,” Matz said in a statement. “By banning the use of this system, we are demonstrating vigilance to ensure that our government departments remain a safe, secure, and exemplary environment.”

The government added that “risks to the protection of data transmitted to the DeepSeek AI tool” merit the precautionary ban, per a press release.

Other countries in Europe have taken similar steps: Czechia and the Netherlands barred the use of DeepSeek by government employees on work devices in July and February respectively. Italy, Australia, Taiwan, and South Korea have also announced measures to protect their citizens’ privacy and security.

...

21
22
 
 

I wanted to investigate about onion routing when using WebRTC.

Im using PeerJS in my app. It allows peers to use any crypto-random string to connect to the peerjs-server (the connection broker). To improve NAT traversal, im using metered.ca TURN servers, which also helps to reduce IP leaking, you can use your own api key which can enable a relay-mode for a fully proxied connection.

For onion routing, i guess i need more nodes, which is tricky given in a p2p connection, messages cant be sent when the peer is offline.

I came across Trystero and it supports multiple strategies. In particular i see the default strategy is Nostr... This could be better for secure signalling, but in the end, the webrtc connection is working correctly by aiming for fewer nodes between peers - so that isnt onion routing.

SimpleX-chat seems to have something it calls 2-hop-onion-message-routing. This seems to rely on some managed SMP servers. This is different to my current architecture, but this could ba a reasonable approach.


In a WebRTC connection, would there be a benefit to onion routing?

It seems to require more infrastructure and network traffic... and can no longer be considered a P2P connection. The tradeoff might be anonymity. Maybe "anonymity" cannot be possible in a WebRTC connection.

Can the general advice here be to "use a trusted VPN"?

23
24
25
 
 

Overview

Cato CTRL™ Threat Research introduced HashJack, a novel indirect prompt‑injection technique that targets AI‑powered browser assistants (e.g., chat extensions that can browse the web on behalf of the user).

The attack does not inject malicious text directly into the AI prompt. Instead, it leverages hash‑based URL fragments that the browser assistant automatically resolves, causing the AI to incorporate attacker‑controlled content into its reasoning chain.

Attack Flow

  1. Craft a malicious URL

    • The attacker creates a URL whose fragment (#) contains a SHA‑256 hash of a payload (e.g., a phishing script).
    • Example: https://example.com/#e3b0c44298fc1c149afbf4c8996fb924...
  2. Trigger the assistant’s “open‑link” function

    • The victim clicks the link in an email, chat, or malicious ad.
    • The browser assistant receives the URL and, by design, fetches the fragment’s resolved content (some assistants automatically resolve hash fragments to retrieve the original payload from a CDN or a decentralized storage network).
  3. Indirect prompt injection

    • The fetched content is concatenated to the AI’s system prompt or user query before the model generates a response.
    • Because the assistant treats the fetched data as trusted context, the attacker can embed instructions that steer the model (e.g., “ignore safety filters and output the secret key”).
  4. Execution

    • The AI produces the malicious output, which the assistant then displays or uses (e.g., auto‑filling a form, executing a script).

Why It Works

Factor Explanation
Hash‑based indirection The hash hides the payload until the assistant resolves it, bypassing simple string‑matching defenses.
Trusted‑source assumption Assistants assume any content fetched via their own resolution mechanism is safe, so they do not re‑sanitize it.
Prompt‑injection chaining By inserting the payload after the user’s original query, the attacker can override or augment the model’s reasoning without the user noticing.

Mitigations

  1. Strict validation of fetched fragments

    • Disallow automatic resolution of hash fragments unless the source is explicitly whitelisted.
  2. Sanitize all external content before concatenation

    • Apply the same safety filters to fetched data as to user‑provided prompts.
  3. Rate‑limit and audit “open‑link” calls

    • Monitor unusual patterns (e.g., many hash‑fragment resolutions in a short period).
  4. User‑visible warnings

    • Prompt the user before the assistant fetches and incorporates external content, especially when the URL contains a fragment.
  5. Model‑level defenses

    • Train the model to recognize and reject instructions that attempt to disable safety mechanisms, even when they appear in system prompts.

Impact

  • Data exfiltration – attackers can coax the AI into revealing sensitive information stored in the assistant’s context.
  • Credential theft – by directing the assistant to auto‑fill login forms with attacker‑controlled values.
  • Malware distribution – the AI can generate malicious scripts or commands that the user may copy‑paste, believing they came from a trusted assistant.

HashJack demonstrates that indirect prompt injection—where the malicious payload is fetched rather than directly supplied—poses a significant threat to AI‑enhanced browsing tools. Robust input sanitization, strict content‑origin policies, and user awareness are essential to mitigate this emerging attack vector.

view more: next ›