news

Breaking Cyber News From Cyberint

Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.

  • Jun 24, 2025

    • Jobinfo
    • Israel
    • Handala
    • Business Services
    • Data Encrypted For Impact
    • Middle East
    • Asia

    Handala Claims Cyberattack on Israeli Recruitment Firm

    On June 24, 2025, the pro-Palestinian hacktivist group Handala claimed responsibility for a cyberattack targeting Israel Job Info Ltd, a prominent Israeli recruitment and placement company. The group alleged it had exfiltrated 419 gigabytes of internal data, including resumes, employment contracts, internal communications, and client records, and published over 50,000 documents as proof of compromise. Additionally, They warned of additional leaks to come.

  • Jun 22, 2025

    • Israel
    • Handala
    • Business Services
    • Data Encrypted For Impact
    • Ben Horin & Alexandrovitz
    • Middle East
    • Asia

    Ben Horin Alexandrovitz Media Firm Alleged Breached by Handala

    On June 22, 2025, the pro-Palestinian hacktivist group Handala claimed responsibility for a large-scale breach of Israeli media and communications firm Ben Horin Alexandrovitz Ltd. The group alleges to have exfiltrated 11 TB of internal data, released over 50,000 documents as proof of compromise and disrupted operations by wiping servers and accessing affiliated platforms. The attack was described as targeting the firm’s alleged ties to Israeli intelligence and psychological operations.

  • Jun 22, 2025

    • Israel
    • Zachary Levi And Sons - Construction
    • Handala
    • Business Services
    • Data Encrypted For Impact
    • Middle East
    • Asia

    Construction Firm Zacharia Levi Ltd Alleged Breached by Handala

    On June 21, 2025, the pro-Palestinian hacktivist group Handala claimed responsibility for a breach targeting Israeli construction company Zacharia Levi Ltd. The group alleges to have exfiltrated the company’s entire database, including project files, contracts, financial documents, internal communications, and technical blueprints. Over 20GB of data was leaked as proof of compromise.

  • Jun 22, 2025

    • Israel
    • Handala
    • Business Services
    • Data Encrypted For Impact
    • Middle East
    • Asia
    • Sivim It

    Security Firm Sivim Alleged Breached by Handala

    On June 20, 2025, the pro-Palestinian hacktivist group Handala claimed responsibility for a breach targeting Israeli cybersecurity firm Sivim IT. The group released two proof of compromise archival links.

  • Jun 19, 2025

    • Israel
    • Digitalghost
    • Business Services
    • Mprest
    • Middle East
    • Asia

    DigitalGhost Claims Breach of Israeli Iron Dome Contractor

    A threat actor operating under the alias "DigitalGhost" has claimed responsibility for allegedly breaching mPrest, an Israeli technology contractor allegedly involved in developing software for the Iron Dome missile defense system. According to the attacker, they managed to access a database containing personal information of individuals connected to the company. No official confirmation has been provided regarding the authenticity or scope of the breach.

  • Jun 11, 2025

    • United States
    • Business Services
    • Mirai
    • CVE-2025-24016
    • North America
    • Wazuh
    • Cve-2025-24016

    Exploitation of Wazuh Vulnerability by Mirai Botnet Variants

    Researchers have reported that threat actors are exploiting a critical vulnerability (CVE-2025-24016) in Wazuh servers to deploy Mirai botnet variants for conducting distributed denial-of-service (DDoS) attacks. This vulnerability allows remote code execution and has been targeted shortly after its public disclosure in February 2025. The attacks involve two different botnets using malicious shell scripts to download Mirai payloads from external servers. The research indicates that the botnets are leveraging various exploits, including those targeting IoT devices, and have been found to particularly focus on devices in regions such as China, India, and several others. The ongoing exploitation of this vulnerability highlights the rapid response of botnet operators to newly published security flaws.

  • Jun 11, 2025

    • Southern Asia
    • Advanced Weapons And Equipment India
    • Business Services
    • Clayoxtymus1337
    • India
    • Asia

    Hacktivist group Claims Breach of Indian Defense Contractor

    In June 2025, a threat actor group named ClayOxtymus1337 claimed to have breached Advanced Weapons and Equipment India Limited (AWEIL) and to have gained access to its database. According to the threat actor, sensitive data belonging to AWEIL was taken, including critical weapon technical specifications, secret R&D projects, arms export contracts worth ₹581 crore, and a list of importing countries that could trigger diplomatic pressure.

  • Jun 01, 2025

    • Business Services
    • United Kingdom
    • Europe
    • 303
    • Deloitte

    Deloitte Reportedly Breached, Source Code and GitHub Credentials Leaked

    A threat actor known as "303" claimed on the dark net forum "darkforums" to have breached "Deloitte," leaking GitHub credentials and internal source code from a "Deloitte" repository. A sample Git configuration file was posted, showing what appears to be access to a private GitHub project related to Deloitte’s U.S. consulting services. "Deloitte," headquartered in London, is one of the "Big Four" accounting and consulting firms, providing services in audit, tax, consulting, risk, and financial advisory across over 150 countries.

  • May 28, 2025

    • Resource Hijacking
    • Network Service Discovery
    • Exploitation For Client Execution
    • Match Legitimate Name Or Location
    • Escape To Host
    • Docker
    • External Remote Services
    • Smb/Windows Admin Shares
    • Unix Shell
    • Remote System Discovery
    • Lateral Tool Transfer
    • Deploy Container
    • Web Protocols
    • Change Default File Association
    • Ingress Tool Transfer
    • United States
    • Business Services
    • Obfuscated Files Or Information
    • North America
    • Exploit Public-Facing Application

    Cryptojacking Campaign Targets Misconfigured Docker APIs

    A new malware campaign has emerged, targeting misconfigured Docker API instances to create a cryptocurrency mining botnet focused on mining Dero currency. The threat actor exploits insecurely published Docker APIs to gain access to running containerized infrastructures, propagating the malware through a worm-like mechanism to infect other exposed Docker instances. The attack utilizes two main components: a propagation malware named 'nginx' that scans for vulnerable Docker APIs, and a 'cloud' Dero cryptocurrency miner. This campaign has been linked to previous cryptojacking operations and poses a significant risk to any network with insecure Docker APIs.

  • May 28, 2025

    • Resource Hijacking
    • Romania
    • Business Services
    • Europe
    • Venom Rat
    • Bitdefender
    • Financial Theft
    • Eastern Europe
    • Cameleon

    New Malicious Campaign Exploits Fake Antivirus Website to Distribute Venom RAT

    Cybersecurity researchers have uncovered a malicious campaign that utilizes a fraudulent website masquerading as Bitdefender's antivirus software to distribute a remote access trojan known as Venom RAT. The site, bitdefender-download[.]com, tricks users into downloading a zip file containing malware disguised as an installer. This campaign aims to compromise victims' credentials and crypto wallets, highlighting a trend of sophisticated, modular malware that leverages open-source components for more effective attacks.

  • May 26, 2025

    • Cve-2025-0944
    • CVE-2025-0944
    • United States
    • Tetraloader
    • Business Services
    • Government
    • Uat-6382
    • Trimble
    • North America
    • Critical Infrastructures

    Chinese Threat Actor UAT-6382 Exploits Vulnerability in Trimble Cityworks

    A Chinese-speaking threat actor known as UAT-6382 has been linked to the exploitation of a recently patched remote-code-execution vulnerability (CVE-2025-0944) in Trimble Cityworks. This group successfully targeted enterprise networks of local governing bodies in the United States, deploying various web shells and custom malware, including Cobalt Strike and a Rust-based loader called Tetraloader, to maintain long-term access to compromised systems. The attacks began in January 2025, and the vulnerability was added to the U.S. Cybersecurity and Infrastructure Security Agency's known exploited vulnerabilities catalog in February 2025.

Ready to
experience hyper-relevance?

See Argos Edge in action!

Schedule a demo