Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Latest News

PayPal Alerts Users to Data Exposure Linked to Loan App Software Glitch

  PayPal has informed customers about a data exposure incident caused by a software error in its loan application platform, which left sens...

All the recent news you need to know

Anthropic Launches Claude Code Security To Autonomously Detect And Patch Bugs

 

Anthropic has introduced Claude Code Security, a new AI-powered capability in its Claude Code assistant that promises to raise the bar for software security by scanning entire codebases for vulnerabilities and suggesting human-reviewed patches. The feature is currently rolling out in a limited research preview for Enterprise and Team customers, reflecting Anthropic’s cautious approach to deploying advanced cybersecurity tools. By positioning this as a defender-focused technology, the company aims to counter the same AI-driven techniques that attackers are starting to use to automate vulnerability discovery at scale.

Unlike traditional static analysis tools that rely on rule-based pattern matching and known vulnerability signatures, Claude Code Security analyzes code more like a human security researcher. It reasons about how different components interact, traces data flows through the application, and flags subtle issues that conventional scanners often miss. This deeper contextual understanding is designed to surface complex and high-severity bugs that may have remained hidden despite years of manual and automated review. 

Each issue identified by Claude Code Security goes through a multi-stage verification process intended to filter out false positives before results ever reach a security analyst. The system re-examines its own findings, attempts to prove or disprove them, and assigns both severity and confidence ratings so teams can prioritize the most critical fixes. All results are presented in a dedicated dashboard, where developers and security teams can inspect the affected code, review the suggested patches, and decide how to remediate. Anthropic emphasizes a human-in-the-loop model, ensuring that nothing is changed without explicit developer approval.

Claude Code Security builds on more than a year of research into Anthropic’s cybersecurity capabilities, including testing in capture-the-flag competitions and collaborations with partners such as Pacific Northwest National Laboratory. Using its latest Claude Opus 4.6 model, Anthropic reports that it has already uncovered more than 500 long-standing vulnerabilities in production open-source projects, many of which had survived decades of expert scrutiny. Those findings are now going through triage and responsible disclosure with maintainers, reinforcing the tool’s emphasis on real-world impact and careful rollout. 

Anthropic sees this launch as part of a broader shift in the cybersecurity landscape, where AI will routinely scan a significant share of the world’s code for flaws. The company warns that attackers will increasingly use similar models to find exploitable weaknesses faster than ever, but argues that defenders who move quickly can seize the same advantages to harden their systems in advance. By making Claude Code Security available first to enterprises, teams, and open-source maintainers, Anthropic is betting that AI-augmented defenders can keep pace with, and potentially outmaneuver, AI-empowered adversaries.

Dragos Warns of New State-Backed Threat Groups Targeting Critical Infrastructure

 

A fresh wave of state-backed hacking targeted vital systems more aggressively over the past twelve months, as newer collectives appeared while long-known teams kept their campaigns running, per Dragos’ latest yearly analysis. Operating underground until now, three distinct gangs specializing in industrial equipment surfaced in 2025, highlighting an ongoing rise in size and complexity among nation-supported digital intrusions. That count lifts worldwide monitoring efforts to cover 26 such organizations focused on physical machinery networks, eleven of which demonstrated live activity throughout the period. 

One key issue raised in the report involves ongoing operations by Voltzite, which Dragos links directly to Volt Typhoon. Instead of brief cyber intrusions, this group aimed at staying hidden inside U.S. essential systems - especially power, oil, and natural gas networks - for extended periods. Deep infiltration into industrial control setups allowed access beyond standard IT zones, reaching process controls tied to real-world machinery. Evidence shows their goal was less about data theft, more about setting conditions for later interference. Long-term positioning suggests preparation mattered more than immediate gain. 

Starting with compromised Sierra Wireless AirLink devices, hackers gained entry to pipeline operational technology environments during one operation. From there, sensor readings, system setups, and alert mechanisms were pulled - details that might later disrupt functioning processes. Elsewhere, actions tied to Voltzite relied on a network of infected machines scanning exposed energy, defense, and manufacturing systems along with virtual private network hardware. Analysts view such probing as groundwork aimed at eventual breaches. 

One finding highlighted three emerging threat actors. Notably, Sylvanite operates as an access provider - exploiting recently revealed flaws in common business and network-edge systems before passing entry points to Voltzite for further penetration. Following close behind, Azurite displays patterns tied to Chinese-affiliated campaigns, primarily targeting operational technology setups where engineers manage industrial processes; it gathers design schematics, system alerts, and procedural records within heavy industry, power infrastructure, and military-related production environments. 

Meanwhile, a different cluster named Pyroxene surfaced in connection with Iran's digital offensives, using compromised suppliers to breach networks while deploying disruptive actions when global political strain peaks. These developments emerged clearly through recent investigative analysis. Still, Dragos pointed out dangers extending beyond China and Iran. Operations tied to Russia kept challenging systems in power and water sectors. Across various areas, probing efforts focused on industrial equipment left visible online. Even when scans did not lead to verified breaches, their accuracy and reach signaled growing skill. 

The report treated such patterns as signs of advancing tactics. Finding after finding points to an ongoing trend: silent infiltration of vital system networks over extended periods. Instead of causing instant chaos, operations seem built around stealthy placement within core service frameworks, building up danger across nations and sectors alike. Not sudden blows - but slow seepage - defines the growing threat.

AI Powered Attacks Target Hundreds of Fortinet Firewalls in Weeks


 

Cybercrime sophistication is no longer primarily determined by technical mastery but by the ability to industrialize opportunities as well. An anonymous, Russian-speaking threat actor quietly orchestrated a campaign over five weeks ago that compromised more than 600 FortiGate devices in 55 countries, without the use of zero-day discoveries or complex exploit chains.

The technology relied instead on commercially available generative artificial intelligence services which were repurposed to automate reconnaissance, credential testing, and large-scale targeting with disturbing efficiency.

According to Amazon Threat Intelligence's findings published in January 2026, the activity occurred during this period, unfolding with a consistency indicating that process rather than improvisation played a significant role. 

A noteworthy finding of the investigation is that no new FortiGate vulnerabilities have been exploited. The breach occurred as a result of identifying exposed management ports and using weak credentials protected only by single-factor authentication fundamental security weaknesses that, when amplified by artificial intelligence-assisted automation, permitted even the least sophisticated actors to operate on a global scale. 

The success of the campaign was not a result of technical innovation, but rather of systematic exploitation of neglected basics, as CJ Moses, Chief Information Security Officer of Amazon Integrated Security, pointed out in the report. 

Further, technical analysis indicates that less emphasis was placed on software flaws than on operational exposure during the campaign. It appears that the actor has identified FortiGate management interfaces accessible via the public internet by scanning for services that operate on ports 443, 8443, 10443, and 4443, indicating opportunistic targeting rather than sector-specific targeting. The reconnaissance pattern suggests broad reconnaissance for administrative access. 

A sustained brute force authentication attempt, using commonly reused or weak passwords was used to carry out the intrusions rather than the use of zero-day exploits, which are often associated with perimeter appliances attacks. Once administrative access had been established to the compromised firewalls, the actor was able to extract complete configuration files quickly from the compromised firewalls using complete configuration files.

Data contained in these files included highly sensitive operational information, such as SSL-VPN credentials and passwords, administrative account information, firewall policies, internal network segmentation rules, IPsec VPN configurations, routing tables, and information relating to broader network topology.

In addition to providing immediate control over the appliance, these datasets provide an in-depth blueprint of the appliance's internal environment, allowing for lateral movement and follow-up. The investigation led to the identification of server hosting tooling associated with the campaign, which drew the attention of Amazon's security teams. 

The exfiltrated configuration files were then decoded and parsed using what appeared to be artificial intelligence-assisted Python and Go utilities, thus expediting the extraction of credential information and architectural insights. With the help of automation, the actor was able to pivot rapidly across compromised networks and expand access with methodical efficiency as a result of the reduced manual effort required to interpret firewall configurations. 

After initial access to the firewall appliance, the threat actor utilized the extracted configuration information to extend control beyond the perimeter of the device. As a result of obtaining administrative and VPN credentials from these devices, the actor was able to access internal environments and focus on directory services and identity management. 

Post-compromise activities included targeting Active Directory deployments, obtaining additional credentials, and assessing privilege levels to facilitate lateral movement in several instances. Also identified as a priority objective was backup infrastructure, including Veeam servers a practice consistent with financial motivated operations seeking the greatest amount of leverage over victim organizations. 

Amazon Web Services stated that the tooling recovered during the investigation was operational, but technically unrefined. Parsing routines appeared simplified, with redundant annotations and structural patterns which suggested early stage automated code generation. However, the utilities are still effective enough to automate the extraction and structuring of sensitive configuration data on a large scale despite these limitations. 

In the actor’s methodology, breadth was favored over persistence; environments with stronger controls or imposing resistance were often deprioritized in favor of targets that were more accessible, emphasizing an approach that prioritized volume rather than stealth or advanced tradecraft. As far as geography was concerned, the campaign did not have a clear sectoral or regional focus. 

Compromises have occurred in Europe, Asia, Africa, and Latin America, suggesting an opportunistic scan and exploitation of exposed infrastructure. Analysts observed clustering patterns that suggested potential access to managed service providers or shared hosting environments, raising the possibility that one compromise could have resulted in cascading exposure to downstream clients. 

It confirms a recurring conclusion in enterprise security: foundational controls remain decisive. The timing of these findings is noteworthy as it would likely have disrupted much of the observed activity if management interfaces had been restricted from public exposure, multi-factor authentication enforced, and password reuse had been eliminated. 

Google issued a warning only weeks earlier that criminal actors are increasingly using generative artificial intelligence tools directly in operational workflows including its Gemini chatbot for reconnaissance, target profiling, phishing campaigns, and malware development. 

It is in this context that the FortiGate intrusions illustrate how AI services are being operationalized as force multipliers for exploiting longstanding security gaps rather than as exotic capabilities. In the following steps, after the threat actor first gained access to the firewall appliance, he used the extracted configuration data to extend control beyond the perimeter.

By utilizing the device's authentication credentials, the actor could gain access to internal environments, where directory services and identity infrastructure were of particular interest. As part of post-compromise activities, Active Directory deployments were targeted, additional credentials were harvested, and privilege levels were assessed in order to facilitate lateral movement. 

Veeam servers were also identified as a priority objective, consistent with financial motivated operations seeking to maximize leverage over victim organizations. It was noted by Amazon that the tools recovered during the investigation were functional, but technically unrefined. 

The parsing routines looked simplistic, with redundant annotations and structural patterns suggesting automated code generation in its early stages. However, despite these limitations, the utilities demonstrated sufficient effectiveness in automating the extraction and structuring of sensitive configuration data in large quantities. 

A broad approach was used by the actor as opposed to persistence; environments implementing more restrictive controls or presenting resistance were frequently overlooked in favor of easier to access targets, underscoring a volume-driven strategy rather than one dependent on stealth or advanced tradecraft. Geographically, the campaign did not adhere to any specific sectoral or regional focus. 

There were opportunistic scanning and exploitation of exposed infrastructure across Europe, Asia, Africa, and Latin America that resulted in compromised devices. Analysts observed clusters that indicated potential access to managed hosting environments or managed service providers, indicating that single compromises could have resulted in cascading exposures for downstream clients. 

According to the broader assessment, enterprise security remains a recurrent theme: foundational controls continue to be crucial. If management interfaces had been restricted from public exposure, multi-factor authentication was enforced, and password reuse was eliminated, much of the observed activity would likely have been disrupted before escalation occurred. 

The timing of these findings is noteworthy. Google issued a warning only weeks earlier that criminal actors are increasingly using generative artificial intelligence tools directly in operational workflows including its Gemini chatbot for reconnaissance, target profiling, phishing campaigns, and malware development. 

It is in this context that the FortiGate intrusions illustrate how AI services are being operationalized as force multipliers for exploiting longstanding security gaps rather than as exotic capabilities. Upon securing VPN-based footholds, the threat actor developed a custom reconnaissance program, which was developed in parallel in Go and Python. 

The goal of this program is to facilitate the systematic detection of compromised accounts after a compromise has occurred. It is believed that Amazon’s analysis of the source code revealed multiple signs of artificial intelligence-assisted development, such as redundant commentary echoing function names, structurally simplistic design focusing disproportionately on formatting conventions, improvised JSON parsing through string matching rather than formal deserialization, and placeholder compatibility wrappers accompanied by empty documentation. 

Despite being operationally adequate for the actor's immediate objectives, the tooling lacked resilience and routinely failed under edge conditions characteristics consistent with machine-generated code deployed with minimal refinement. 

The utilities nevertheless allowed automatic detection of compromised environments despite these limitations. They parsed routing tables, segmented networks by size and segmentation, and executed parallel port scans, including the open-source GoGo scanner. By identifying hosts and domain controllers exposed to SMB, they identified HTTP services that could be accessed by using Nuclei templates.

Execution instability and parsing failures were more common in hardened networks; however, the actor's strategy did not depend upon persistance in such environments. Instead, unsuccessful attempts were frequently abandoned and replaced with targets that were less protected. 

As part of the investigation, operational notes containing instructions in Russian were found describing the deployment of Meterpreter payloads and mimikatz for DCSync attacks against Windows domain controllers, which were used to extract NTLM password hashes directly from Active Directory databases.

Backup infrastructure was prominently emphasized in the playbook. During the campaign, customized PowerShell scripts were used to identify and compromise Veeam Backup and Replication servers, as well as credential extraction binaries were compiled, and exploitable vulnerabilities were attempted. 

The actor's infrastructure, including a server at 212[.]11.64.250, was observed by Amazon to contain a PowerShell script titled “DecryptVeeamPasswords.ps1” explicitly designed to retrieve credentials from Veeam environments.

The targeted approach is consistent with established ransomware tactics, which involves neutralizing backup systems prior to encryption to prevent recovery. Several public vulnerabilities are referenced in the actor's documentation, including CVE-2019-7192, which affects QNAP devices, CVE-2023-27532, which affects Veeam information disclosure, and CVE-2024-40711, which affects Veeam remote code execution. 

After repeated attempts to exploit patched or tightly controlled systems were unsuccessful, the operator directed attention to more accessible infrastructure rather than escalating technical effort. According to Amazon, the individual or group involved in this activity possess low-to-medium technical proficiency, with generative artificial intelligence enhancing operational capabilities.

There was evidence of at least two commercial large language model providers being integrated into the campaign workflow. By using these services, step-by-step attack methodologies were developed, custom scripts were developed across multiple languages, reconnaissance frameworks were constructed, lateral movement strategies were refined, and operational documentation was prepared. 

The actor was known to have submitted to an artificial intelligence platform a complete internal network topology containing IP addresses, hostnames, credentials and enumerated services, as well as structured guidance on how to further compromise the network. As a result, commercially available artificial intelligence services are reducing technical barriers, enabling actors to operationalize complex intrusion sequences that would be beyond the scope of their native capabilities. 

An independent study published by Cyber and Ramen security blog provided further technical confirmation. It was discovered that 1,402 files were distributed across 139 subdirectories on the same exposed server identified by Amazon, which included stolen FortiGate configuration backups, Active Directory mapping information, credential dumps, vulnerability assessments, and structured attack planning documents, among other items. 

Among the contents of the directory were exploit code repositories, Nuclei scan templates, and Veeam credentials extraction utilities. Over 200 files, including task outputs, session differentials, and cached prompt states associated with Claude Code interactions, were reported to be in two folders labeled "claude-0" and "claude"

The configuration data and credentials related to a compromised FortiGate appliance were located in a separate directory. This package included a custom Model Context Protocol server named ARXON, described as an intermediary framework that bridged reconnaissance datasets with commercial language models. It did not have any public references, suggesting it was specifically designed for this project.

In order to generate attack plans that were operationalized, the MCP server ingested reconnaissance output and relayed structured inputs to language models. By deploying the CHECKER2 Go-based orchestration tool over Docker, thousands of VPN endpoints were scanned simultaneously, resulting in logs indicating more than 2,500 potential targets from over 100 countries across a broad spectrum of countries. 

According to the researcher, reconnaissance data obtained from FortiGate appliances and internal networks was fed into ARXON, thereby producing structured escalation pathways based on models such as DeepSeek and Claude. Among the outputs were recommendations on how to obtain Domain Admin privileges, prioritized credential search locations, suggested exploitation sequences, and guidelines on lateral movement. 

It has been reported that certain configurations of Claude Code instances could execute offensive tooling - including Impacket scripts, Metasploit modules, and Hashcat - without manual approval, further speeding up the decision-to-action process. Over a period of several weeks, the operational infrastructure evolved. 

The initial phases relied on a free open-source HexStrike MCP framework before converting to a more automated and tailored ARXON environment approximately eight weeks later. This trajectory illustrates a deliberate effort to industrialize post-compromise analysis using artificial intelligence-mediated orchestration.

Germán Fernández of CronUp security research firm identified another exposed server hosting what appears to be artificial intelligence-generated tools that target FortiWeb appliances. Although the discovery is not directly related to the FortiGate campaign, it is a reflection of generative AI becoming increasingly woven into intrusion lifecycles, rather than a novelty.

For defenders, the implications are immediately evident AI does not replace traditional tradecraft, but rather accelerates and scales it. Independent investigations all agree that AI does not replace traditional tradecraft. 

Patch edge devices, restrict the access to administrative interfaces, audit anomalous SSH and VPN activity, enforce multi-factor authentication, and harden backup systems as soon as possible to avoid becoming leverage points in automated, artificial intelligence-aided intrusions. This study indicates that, in addition to the dramatic change in operational dynamics, there has been a significant increase in adversary sophistication. 

In this campaign, moderately skilled actors are able to operate at the same pace and reach as more experienced operators as AI services can compress reconnaissance, analysis, and decision making cycles. For enterprise defenders, this lesson is neither abstract nor speculative. 

Managing exposures disciplinefully, maintaining continuous credential hygiene, monitoring the identity infrastructure rigorously, and ensuring backup integrity proactive will contribute to the resilience of the organization. 

When generative AI is increasingly embedded into offensive workflows, defensive strategies must evolve concurrently prioritizing visibility across edge devices, enforcing layered authentication controls, and stress testing response readiness against automation-driven intrusion patterns. 

When operating in this environment, preparedness has less to do with anticipating novelty than it does with eliminating the structural weaknesses that automation is uniquely equipped to exploit at scale.

Volt Typhoon Still Targeting Critical Infrastructure, Report Finds

 


Cybersecurity investigators are warning that the threat actor widely tracked as Volt Typhoon may still have hidden access inside segments of U.S. critical infrastructure, and some compromises could remain undiscovered permanently.

For nearly three years, U.S. military and federal law enforcement agencies have worked to identify and remove intrusions affecting electricity providers, water utilities and other essential service operators in strategically sensitive regions. Despite these sustained efforts, a newly released industry assessment suggests that the full scope of the activity may never be completely known.

In its latest annual threat report, industrial cybersecurity firm Dragos stated that actors associated with Volt Typhoon continued targeting American utility networks into 2025. The company indicated that, even with heightened public scrutiny and coordinated government response, the campaign remains ongoing.

Rob Lee, chief executive of Dragos, said in recent media briefings that the group is actively studying infrastructure environments and establishing footholds not only in the United States but also across allied nations. When asked whether every previously breached organization could ultimately detect and eliminate the intruders, Lee responded that certain compromised sites in both the U.S. and NATO countries may never be identified.

U.S. officials have previously assessed that the objective of Volt Typhoon is to position access within operational technology environments in advance of any geopolitical conflict. Operational technology systems manage physical processes such as electricity transmission, water treatment and industrial production. By embedding themselves in these networks ahead of time, attackers could potentially disrupt or delay U.S. military mobilization during a crisis. Lee added that the group prioritizes strategically significant entities and works to preserve long-term, covert access.

He also noted that regulatory measures expected over the next three to five years may strengthen detection standards across the sector. Larger electricity providers often possess advanced monitoring capabilities and incident response programs that improve their ability to uncover and expel actors. However, many smaller public utilities, particularly in the water sector, lack comparable technical resources. In Lee’s assessment, while investigations are technically possible at such organizations, it is unlikely that all will reach the maturity needed to detect and remove deeply concealed compromises. He suggested that, at the current pace, some portion of infrastructure may remain infiltrated.

China has rejected allegations linking it to Volt Typhoon. Nonetheless, previous U.S. government investigations reported discovering evidence of concealed access in infrastructure systems in Guam and in proximity to American military installations, raising concerns about strategic intent. Officials have also acknowledged that the total number of affected entities is unknown and that any publicly cited figures likely underestimate the scale.

The Dragos report further describes another activity cluster, referred to by the company as SYLVANITE, which allegedly secures initial entry into infrastructure networks before access is leveraged by Volt Typhoon. According to the firm, this activity has targeted operational technology systems across North America, Europe, South Korea, Guam, the Philippines and Saudi Arabia, affecting oil and gas operations, water utilities, electricity generation and transmission entities, and manufacturing organizations.

Lee characterized this second group as facilitating access rather than directly causing operational disruption, effectively preparing entry points for subsequent exploitation.

Researchers also linked recent high-profile vulnerability exploitation campaigns to these actors, including flaws in widely deployed enterprise software from Ivanti and the Trimble Cityworks geographic information system platform developed by Trimble. A year ago, the federal civilian cybersecurity agency instructed government bodies to urgently remediate a Cityworks vulnerability, after which private security firms reported that Chinese-linked actors had used it to compromise multiple local government networks.

Dragos warned that unauthorized access to geographic information system data can provide detailed infrastructure mapping and asset intelligence. Such information, if exploited, could enable adversaries to design targeted and potentially disruptive industrial control system operations. The firm concluded that Volt Typhoon’s more recent activity reflects movement beyond conventional IT data theft toward direct engagement with operational technology devices, including the collection of sensor readings and operational parameters, heightening concerns for essential service resilience.


Critical better-auth Flaw Enables API Key Account Takeover

 

A flaw in the better-auth authentication library could let attackers take over user accounts without logging in. The issue affects the API keys plugin and allows unauthenticated actors to generate privileged API keys for any user by abusing weak authorization logic. Researchers warn that successful exploitation grants full authenticated access as the targeted account, potentially exposing sensitive data or enabling broader application compromise, depending on the user’s privileges. 

The better-auth library records around 300,000 weekly downloads on npm, making the issue significant for applications that rely on API keys for automation and service-to-service communication. Unlike interactive logins, API keys often bypass multi-factor authentication and can remain valid for long periods. If misused, a single key can enable scripted access, backend manipulation, or large-scale impersonation of privileged users. 

Tracked as CVE-2025-61928, the vulnerability stems from flawed logic in the createApiKey and updateApiKey handlers. These functions decide whether authentication is required by checking for an active session and the presence of a userId in the request body. When no session exists but a userId is supplied, the system incorrectly skips authentication and builds user context directly from attacker-controlled input. This bypass avoids server-side validation meant to protect sensitive fields such as permissions and rate limits. 

In practical terms, an attacker can send a single request to the API key creation endpoint with a valid userId and receive a working key tied to that account. The same weakness allows unauthorized modification of existing keys. Because exploitation requires only knowledge or guessing of user identifiers, attack complexity is low. Once obtained, the API key allows attackers to bypass MFA and operate as the victim until the key is revoked. 

A patched version of better-auth has been released to fix the authorization checks. Organizations are advised to upgrade immediately, rotate potentially exposed API keys, review logs for suspicious unauthenticated requests, and tighten key governance through least-privilege permissions, expiration policies, and monitoring. 

The incident highlights broader risks tied to third-party authentication libraries. Authorization flaws in widely adopted components can silently undermine security controls, reinforcing the need for continuous validation, disciplined credential management, and zero-trust approaches across modern, API-driven environments.

Indonesia Hit by $2m Fraud Wave Using Fake ‘Coretax’ Tax Apps

 

A massive fraud campaign abusing Indonesia’s official Coretax tax platform has siphoned off an estimated 1.5–2 million dollars in losses nationwide, highlighting how cybercriminals now weaponize public digital services at industrial scale. 

Launched around July 2025 and ramped up ahead of the 2026 tax filing season, the operation preyed on taxpayers who believed they were interacting with legitimate Coretax channels. Although Coretax is only available as a web service, victims were deceived into thinking an official mobile app existed, turning their smartphones into entry points for financial theft. This gap between user perception and the platform’s real distribution model became the core social engineering hook.

According to Group-IB, the attackers built a multi-stage attack chain that blended classic phishing with modern mobile malware techniques. It started with phishing websites that visually mimicked the Coretax portal and other trusted brands, then continued via WhatsApp messages and calls from impostors posing as tax officials. These contacts pushed users to download Android application packages (APKs) masquerading as Coretax tools for filing or synchronizing tax data. Once installed, the malicious apps granted remote access, allowing fraudsters to control infected devices, freeze screens, and intercept sensitive data.

The campaign has been linked to the GoldFactory threat cluster, known for deploying advanced Android remote access trojans such as Gigabud.RAT and MMRat. Investigators uncovered 228 new malware samples tied to the operation, underlining the industrialized nature of the scheme. Beyond Coretax, the same infrastructure impersonated more than 16 reputable brands, including government services, airlines, pension funds, and energy providers, significantly widening the pool of potential victims. This brand-hopping strategy enabled attackers to reuse tooling while constantly refreshing lures.

At its peak, the operation aimed at roughly 67 million Indonesian taxpayers and, more broadly, at 287 million individuals exposed to abused brands across the country. While the overall compromise rate remained relatively low—around 0.025% of users—the scale of the population meant financial losses and associated costs still reached between 1.5 and 2 million dollars. Among financial institutions protected by Group-IB, predictive detection and layered defenses limited successful fraud to just 0.027% of malware-compromised devices. This illustrates how early detection and behavioral analysis can sharply reduce downstream financial impact.

Researchers warn that the operation appears to follow a malware-as-a-service model, supported by a centralized framework that has already generated nearly a thousand phishing URLs. The same toolkit could easily be repurposed against taxpayers and banking customers in other countries, with Thailand, Vietnam, the Philippines, and South Africa cited as likely next targets. For Indonesian users, the key defense is to remember that Coretax does not have a mobile app and is only accessible via official government websites. Verifying domains, refusing APK installations sent over messaging apps, and questioning unsolicited “tax officer” calls are now critical to staying safe during tax season.

Featured