Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Latest News

Critical better-auth Flaw Enables API Key Account Takeover

  A flaw in the better-auth authentication library could let attackers take over user accounts without logging in. The issue affects the API...

All the recent news you need to know

Indonesia Hit by $2m Fraud Wave Using Fake ‘Coretax’ Tax Apps

 

A massive fraud campaign abusing Indonesia’s official Coretax tax platform has siphoned off an estimated 1.5–2 million dollars in losses nationwide, highlighting how cybercriminals now weaponize public digital services at industrial scale. 

Launched around July 2025 and ramped up ahead of the 2026 tax filing season, the operation preyed on taxpayers who believed they were interacting with legitimate Coretax channels. Although Coretax is only available as a web service, victims were deceived into thinking an official mobile app existed, turning their smartphones into entry points for financial theft. This gap between user perception and the platform’s real distribution model became the core social engineering hook.

According to Group-IB, the attackers built a multi-stage attack chain that blended classic phishing with modern mobile malware techniques. It started with phishing websites that visually mimicked the Coretax portal and other trusted brands, then continued via WhatsApp messages and calls from impostors posing as tax officials. These contacts pushed users to download Android application packages (APKs) masquerading as Coretax tools for filing or synchronizing tax data. Once installed, the malicious apps granted remote access, allowing fraudsters to control infected devices, freeze screens, and intercept sensitive data.

The campaign has been linked to the GoldFactory threat cluster, known for deploying advanced Android remote access trojans such as Gigabud.RAT and MMRat. Investigators uncovered 228 new malware samples tied to the operation, underlining the industrialized nature of the scheme. Beyond Coretax, the same infrastructure impersonated more than 16 reputable brands, including government services, airlines, pension funds, and energy providers, significantly widening the pool of potential victims. This brand-hopping strategy enabled attackers to reuse tooling while constantly refreshing lures.

At its peak, the operation aimed at roughly 67 million Indonesian taxpayers and, more broadly, at 287 million individuals exposed to abused brands across the country. While the overall compromise rate remained relatively low—around 0.025% of users—the scale of the population meant financial losses and associated costs still reached between 1.5 and 2 million dollars. Among financial institutions protected by Group-IB, predictive detection and layered defenses limited successful fraud to just 0.027% of malware-compromised devices. This illustrates how early detection and behavioral analysis can sharply reduce downstream financial impact.

Researchers warn that the operation appears to follow a malware-as-a-service model, supported by a centralized framework that has already generated nearly a thousand phishing URLs. The same toolkit could easily be repurposed against taxpayers and banking customers in other countries, with Thailand, Vietnam, the Philippines, and South Africa cited as likely next targets. For Indonesian users, the key defense is to remember that Coretax does not have a mobile app and is only accessible via official government websites. Verifying domains, refusing APK installations sent over messaging apps, and questioning unsolicited “tax officer” calls are now critical to staying safe during tax season.

Enhanced Surveillance Functions Signal a Strategic Shift in Remcos RAT Activity


 

It is difficult to discern the quiet recalibration of remote access malware that occurs without spectacle, but its consequences often appear in plain sight. The newly identified variant of Remcos RAT illustrates this progression clearly and unnervingly. 

In its current architecture, the updated strain focuses on immediacy and persistence instead of serving as passive collectors of stolen information. With its newly designed operational design promoting direct, continuous communication with attacker-controlled infrastructure, it allows for the observation of compromised Windows systems in real time rather than after the incident has occurred. This shift does more than simply represent a routine upgrade.

By moving away from the traditional method of locally caching harvested data, the malware reduces the amount of digital residue typically left behind by investigators. By transmitting information in near real time, compromise and exploitation can be minimized. 

The latest build enhances this capability by enabling live webcam streaming and instantaneous keystroke transmission, creating active surveillance endpoints on infected machines. Therefore, the variant reinforces a broader trend within the threat landscape which places more importance on speed, stealth, and sustained visibility over simple data exfiltration.

According to Point Wild's Lat61 Threat Intelligence Team, the latest Remcos iteration has been designed with a deliberate focus on runtime concealment and forensic minimization in mind. In contrast to the traditional method of embedding webcam footage within the core payload, a streaming module is retrieved and executed only on operator instruction, thereby minimizing its exposure during routine scanning.

The handling of command-and-control configuration data, which is decrypted solely in memory, as opposed to writing it to disk, is also significant. In combination with dynamic API resolution, this approach further complicates static analysis. As opposed to hard-coding Windows API references, malware resolves and decrypts them during execution, thereby frustrating signature-based detection and impeding reverse engineering. 

Additionally, the variant maintains its stealth posture by systematically removing artifacts associated with persistence mechanisms. Screenshots, audio captures, keylogging outputs, browser cookies, and registry entries are purged prior to termination.

The malware may also generate a temporary Visual Basic script to enable the deletion of proprietary or operational files before self-exiting, thereby reducing the residual indicators investigators might otherwise be able to utilize. As researchers observe, the malware has continuously refined its evasion and operational depths, illustrating its continued relevance in the remote access trojan ecosystem. 

During the execution phase, the malware conducts privilege assessments in order to determine the level of system access available for subsequent behavior based upon the privilege assessment. By utilizing this conditional logic, decisions regarding privilege escalation are influenced and high-impact actions can be executed, including the modification of protected directories, changes to registry keys, deployment of persistence mechanisms, or interference with security services—activities that typically require elevated privileges.

By tailoring its behavior to the access context, the malware enhances its survivability and effectiveness within compromised environments by increasing its survivability and effectiveness. As part of initialization routines, intent is obscured until execution is well underway.

As part of the configuration storage process, the binary stores parameters in encrypted or compressed form, allowing parameters to be decrypted only when the command-and-control infrastructure is established.

A layered sequence is created by setting persistence mechanisms, dynamically loading APIs, and selectively activating operational capabilities, thus concealing the full range of functionality during preliminary inspection. These architectural decisions reinforce Remcos RAT's primary objective of providing sustained, covered access accompanied by comprehensive data theft. This malware offers capabilities such as credential harvesting, real-time surveillance, and structured data exfiltration, allowing operators to extract sensitive information as well as maintain interactive control over compromised systems. 

Remcos' current form represents the next evolution of remote access malware—one where stealth, adaptability, and runtime obfuscation define the next phase in this evolving threat landscape. In addition to its layered execution chain, the malware performs a structured privilege assessment prior to initiating high-impact operations. 

By granting elevated rights, it is able to modify registry keys, deploy persistence mechanisms in protected directories, and interfere with or disable local security protocols. In order to prevent multiple concurrent executions of Rmc-GSEGIF, a uniquely named mutex is instantiated, thus ensuring operational stability and reducing the possibility that anomalous behavior may reveal the infection. 

Similarly, the command-and-control infrastructure is protected from direct examination. A malware binary does not contain a readable endpoint address, instead it stores an encrypted C2 address within the binary. As the string is reconstructed in memory during runtime, it can be utilized immediately to establish outbound communication via HTTP or raw TCP channels. 

Through the application of transient reconstruction, static indicators are minimized and the window for intercepting configuration artifacts prior to network activity is narrowed. Following the completion of surveillance and exfiltration tasks, the malware moves to a cleaning phase intended to reduce the possibility of forensic reconstruction. 

The keylogging outputs, screenshots, and audio recordings generated during the operation are systematically deleted, as well as cookies and registry entries associated with persistent access. To complete the self-erasure process, the malware drops a temporary script in the %TEMP% directory which is tasked with deleting remaining executable components before terminating the process. 

As a result of this staged removal mechanism, the evidentiary trail is fragmented, further complicating the analysis after the incident. It is noted by Point Wild researchers that incrementally refined yet consistent refinements of these techniques reflect a sustained commitment to operational resilience and stealth. 

As Remcos continues to evolve, they point out, Remcos reinforces its status as a flexible and enduring remote access trojan. A security team should intensify monitoring of anomalous outbound network connections and unauthorized registry modifications - indicators that may indicate the presence of run-time-obfuscated threats within enterprise environments. 

Among the key elements of the malware’s defensive architecture is the deliberate elimination of plaintext indicators. In the binary, the command-and-control endpoint is not stored in readable form, making it difficult to extract static strings, detect antivirus infections using signatures, and harvest indicators easily.

It is instead the C2 address (IP and port) that is encoded as an encrypted byte array during execution, which is subsequently reconstructed in memory by a byte-wise XOR operation before being sent to the networking layer for outbound communication. Further reducing static visibility, the malware dynamically loads WININET.dll at runtime in place of declaring imports beforehand, and uses the decrypted endpoint to communicate via HTTP or TCP. 

By implementing a transient reconstruction model, critical infrastructure details are reconstructed in memory in an ephemeral manner. This design philosophy is also applied to its surveillance modules. Keyloggers online follow the same structural logic as offline predecessors, but they do not rely on disk persistence.

Instead of writing intercepted keystrokes to local storage, they are packaged in structured payloads and sent directly through the established C2 channel, instead of writing them to local storage. User inputs are intercepted by input hooks, which are streamed to an attacker-controlled infrastructure in real time. 

In addition to minimizing forensic artifacts on the victim's file system by bypassing local file creation, the malware offers operators continuous visibility into active sessions, including browser-based interactions and credentials entry fields. As part of modularization, webcam monitoring capabilities remain flexible and minimize the static footprint of the system. 

Video capture logic is not embedded in the primary executable; rather, upon receiving a webcam-related command, it retrieves a dedicated Dynamic Link Library from the C2 server. After the module is delivered to memory or temporarily to disk, depending on configuration, the module is dynamically loaded with Windows API functions such as LoadLibrary, and specific exported routines are resolved with GetProcAddress. 

A video capture device is initialized, frames are collected, compressed or encoded, and the resulting data is returned to the core process after encoding or compressing. By using the compartmentalized approach, the captured output can be transmitted in segmented form over the existing obfuscated communication channel while maintaining a static signature for the primary payload that does not have to be expanded. 

As an example of additional extensibility, credential recovery plugins, including modules that expose functions such as FoxMailRecovery, that are loaded on demand in order to retrieve stored account information from targeted applications, exhibit additional extensibility. In order to execute and handle commands, a structured, text-based protocol is followed, encapsulating instructions and outputs within predefined string tokens prior to transmission. 

As a result of invoking specific execution flags, such as /sext, the malware temporarily writes the output of a command to a randomly named file within the malware's working directory when it is invoked. By reading, exfiltrating, and deleting the contents, operational continuity and persistent traces can be maintained. In conjunction with these mechanisms, a coherent architectural strategy is demonstrated that emphasizes runtime decryption, modular capability loading, and artifact suppression. 

By making sure sensitive configuration data, surveillance outputs, and auxiliary functionality are either memory-resident or transient, the new Remcos variant emphasizes the importance of security, adaptability, and sustained remote control in compromised Windows environments. These developments take together to illustrate an overall operational shift that cannot be ignored by defenders. 

The Remcos variant exemplifies a class of threats designed to run primarily in memory, minimize static indicators, and adapt dynamically to host conditions as needed. The conventional signature-based controls and perimeter-focused monitoring will not be sufficient to provide sufficient protection against runtime-obfuscated activities on their own. 

In addition to continuous monitoring of anomalous outbound traffic patterns, suspicious API resolutions in memory, unauthorized registry modifications, and irregular module loading events, security teams should prioritize behavioral detection strategies. 

The ability to detect subtle persistence and data exfiltration attempts will be largely dependent on improving endpoint detection and response capabilities, enforcing least privilege access policies, and analyzing telemetry across network and host layers. In an increasingly modular and stealthy environment, proactive detection engineering and disciplined threat hunting will be vital to reducing dwell times and minimizing operational impact.

Bithumb Mistakenly Credits Users With Billions in Bitcoin During Promotion Error

 




A promotional campaign at South Korean cryptocurrency exchange Bithumb turned into a large scale operational incident after a data entry mistake resulted in users receiving bitcoin instead of a small cash-equivalent reward.

Initial reports suggested that certain customers were meant to receive 2,000 Korean won as part of a routine promotional payout. Instead, those accounts were credited with 2,000 bitcoin each. At current market valuations, 2,000 bitcoin represents roughly $140 million per account, transforming what should have been a minor incentive into an extraordinary allocation.

Bithumb later confirmed that the scope of the error was larger than early estimates. According to the exchange, a total of 620,000 bitcoin was mistakenly credited to 695 user accounts. Based on prevailing prices at the time of the incident, that amount corresponded to approximately $43 billion in value. The exchange stated that the issue stemmed from an internal processing mistake and was not connected to external hacking activity or a breach of its security infrastructure. It emphasized that customer asset custody systems were not compromised.

The sudden appearance of large bitcoin balances had an immediate effect on trading activity within the platform. Bithumb reported that the incident contributed to a temporary decline of about 10 percent in bitcoin’s price on its exchange, as some affected users rapidly sold the credited assets. To contain further disruption, the company restricted withdrawals and suspended certain transactions linked to the impacted accounts. It stated that 99.7 percent of the mistakenly issued bitcoin has since been recovered.

The event has revived discussion around the concept often described as “paper bitcoin.” On centralized exchanges, user balances are reflected in internal ledgers rather than always corresponding to coins held in individual blockchain wallets. In practice, exchanges may not maintain a one-to-one on-chain reserve for every displayed balance at every moment. This structural model has previously drawn criticism, most notably during the collapse of Mt. Gox in 2014, which was then the largest bitcoin exchange globally. Its failure exposed major discrepancies between reported and actual holdings.

Data from blockchain analytics firm Arkham Intelligence indicates that Bithumb currently controls digital assets worth approximately $5.3 billion. That figure is substantially lower than the $43 billion temporarily reflected in the erroneous credits, underscoring that the allocation existed within internal accounting records rather than as newly transferred blockchain assets.

Observers on social media platform X questioned how such a large discrepancy could occur without automated safeguards preventing the issuance. Bithumb has faced security challenges in the past. In 2017, an employee’s device was compromised, exposing customer data later used in phishing attempts. In 2018, around $30 million in cryptocurrency was stolen in an attack attributed to the Lazarus Group, an organization widely linked to North Korea. A further breach in 2019 resulted in losses of roughly $20 million and was initially suspected to involve insider participation. In each instance, Bithumb stated that it compensated affected users for lost funds, though earlier incidents included exposure of personal information.

Beyond cybersecurity events, the exchange has also been subject to regulatory scrutiny, including investigations related to alleged fraud, embezzlement, and promotional practices. Reports indicate it was again raided this week over concerns involving misleading advertising.

Bithumb maintains that no customer ultimately suffered a net financial loss from the recent error, though the price movement raised concerns about potential liquidations for leveraged traders. A comparable situation occurred at decentralized exchange Paradex, which reversed trades following a pricing malfunction.

The incident unfolds amid broader market strain, with digital asset prices astronomically below their October peaks and political debate intensifying around cryptocurrency-linked business interests connected to U.S. public figures. Recent disclosures from the U.S. Department of Justice concerning Jeffrey Epstein’s early involvement in cryptocurrency ventures have further fueled online speculation and conspiracy narratives across social platforms.

Shadow Campaigns Expose 37 Nations to State-Linked Cyber Espionage Operations

 

A state-backed cyber espionage effort known as the “Shadow Campaigns” has quietly breached government bodies and critical infrastructure across 37 countries. Investigators from Palo Alto Networks’ Unit 42 assess that the activity began by early 2024 and likely originates from Asia. While no formal attribution has been made, the actor is tracked as TGR-STA-1030 or UNC6619. The campaign is marked by stealth and persistence, focusing on long-term intelligence gathering rather than overt disruption. 

At least 70 organizations were confirmed compromised, primarily government ministries and agencies handling finance, trade, energy, mining, immigration, border control, diplomacy, and law enforcement. Victims span multiple regions, including Brazil’s Ministry of Mines and Energy, Mexican and Bolivian government-linked entities, infrastructure in Panama, and agencies across Europe such as those in Germany, Italy, Poland, and Czechia. Other affected organizations include an Indonesian airline, Malaysian government departments, Mongolian law enforcement, a Taiwanese power equipment supplier, and critical infrastructure entities across parts of Africa. 

Reconnaissance activity was even broader. Between November and December, infrastructure linked to 155 countries was scanned. Systems associated with Australia’s Treasury, Afghanistan’s Ministry of Finance, Nepal’s prime minister’s office, and hundreds of European Union and German government IP addresses showed signs of probing. Analysts noted spikes in activity during politically sensitive periods, including the U.S. government shutdown in October 2025 and the lead-up to Honduras’ national election, suggesting interest in geopolitical developments. Initial access often relied on highly targeted phishing emails referencing internal government matters. 

These messages delivered malware via compressed files hosted on Mega.nz, deploying a loader called Diaoyu that could fetch Cobalt Strike and VShell payloads after performing evasion checks. The group also exploited at least 15 known vulnerabilities in products such as Microsoft Exchange Server, SAP Solution Manager, D-Link devices, and Windows systems. A key finding was a custom Linux kernel rootkit, ShadowGuard, which operates at the kernel level to hide malicious activity and evade detection. 

Infrastructure supporting the campaign used legitimate VPS providers in the U.S., Singapore, and the U.K., along with relay servers and anonymization layers. Researchers conclude the actor is highly capable and remains an ongoing threat to governments and critical services worldwide.

Nitrogen Ransomware Bug Locks Out Attackers from Victims' Data

 

Nitrogen ransomware developers have suffered a self-inflicted blow due to a critical coding error that permanently locks victims' data, even from themselves. This bug in their VMware ESXi-targeting malware corrupts the public key during encryption, rendering decryption impossible despite payments. Cybersecurity firm Coveware's analysis highlights how the group's overconfidence backfired spectacularly.

The flaw stems from a memory management error in Nitrogen's ransomware, derived from leaked Conti 2 source code. During the encryption process, loading a new 64-bit variable (QWORD) overlaps and overwrites the first four bytes of the public key with zeros. This corrupted key lacks a matching private key, making file recovery mathematically unfeasible for attackers too. Victims face total data loss without backups, amplifying the irony of the group's double-extortion tactics. 

Nitrogen, active since 2023, employs sophisticated multi-stage loaders delivered via malvertising and trojanized apps like WinSCP. Initial access leads to DLL sideloading, stagers unpacking Python scripts, and C2 beacons such as Cobalt Strike for persistence and lateral movement. The operation exfiltrates data to Bulgarian servers before encrypting files with a ".nba" extension and dropping "readme.txt" ransom notes. Targets span finance, manufacturing, and healthcare, including recent hits on Durashiloh and LumioDental. 

This attack exemplifies the danger posed by the development of ransomware, where attackers reuse poorly written code without sufficient testing. Coveware points out that the ESXi strain of this ransomware has the potential to make hypervisors unrecoverable, causing attackers to lose interest in their targets following failed negotiation attempts. This supports the strategy of not paying the ransom, as there is no real cost involved in this situation. Immutable backups and network segmentation are essential in countering such threats. 

The attack also demonstrates the ever-changing nature of the world of cybersecurity, where the haste of attackers provides an opportunity for exploitation. The Nitrogen leak site, “NitroBlog,” has begun to leverage the unrecoverable victims, although experts recommend ignoring such threats. Although more careful code analysis could have avoided this self-defeating behavior in the future, the fast development of malware remains a problem.

Cloudflare Launches Moltworker to Run Self-Hosted AI Agent Moltbot on Its Developer Platform

 

Cloudflare has unveiled Moltworker, an open-source framework designed to run Moltbot—a self-hosted personal AI agent—directly on its Developer Platform, eliminating the requirement for dedicated on-premise hardware. Moltbot, formerly known as Clawdbot, functions as a customizable personal assistant that operates within chat applications. It connects with AI models, web browsers, and third-party services while maintaining user control over data and workflows.

Moltworker modifies Moltbot to function within Cloudflare Workers by pairing an entrypoint Worker with isolated Sandbox containers. The Worker serves as the API routing and administrative interface, while Moltbot’s runtime and integrations execute inside secure Sandboxes. To overcome the temporary nature of containers, persistent data—such as conversation history and session information—is stored in Cloudflare R2.

The deployment takes advantage of recent improvements to Node.js compatibility within Cloudflare Workers. According to Cloudflare, enhanced native Node API support reduces reliance on workaround solutions and enables a wider range of npm packages to run without modification. Although Moltbot currently runs primarily inside containers, the company suggests that stronger compatibility could allow more agent logic to shift closer to the edge over time.

Moltworker also incorporates multiple Cloudflare services to mirror and expand upon the local Moltbot setup. AI traffic is routed through Cloudflare AI Gateway, which provides access to multiple model providers along with centralized monitoring and configuration tools. Browser automation is powered by Cloudflare Browser Rendering, enabling Moltbot to operate headless Chromium sessions for tasks such as page navigation, form submissions, and content extraction—without embedding a browser directly within the container. Access control for APIs and the administrative interface is secured through Cloudflare Zero Trust Access.

Early community feedback has been divided. Some users view the hosted model as a way to simplify deployment and encourage broader adoption. Commenting on the announcement, Peter Choi noted that running Moltbot on Cloudflare could significantly broaden adoption, but questioned whether the shift alters the project’s original appeal, which emphasized full local control.

Others emphasized operational convenience. One user wrote:I've been self-hosting on a VPS, which works fine, but managing the box is a chore. This looks like the 'set it and forget it' version. Curious how state persistence works across worker invocations.

Cloudflare has released Moltworker as an open-source project on GitHub and describes it as a proof of concept rather than a fully supported product. The company presents it as a demonstration of how its Developer Platform—integrating Workers, Sandboxes, AI Gateway, Browser Rendering, and storage services—can securely deploy and scale AI agents at the edge.


Featured