news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Israel
- Asia
- Business Services
- Handala
- Middle East
- Jobinfo
- Data Encrypted For Impact
- Shelter Locations In Israel
- Retail
- Saudi Games
- Saudi Arabia
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Government
- Kibbutz Almog
- Manufacturing
- Saban Brands Israel
- Digitalghost
- Mprest
- Evil_Byte
- The Knesset
- Gonjeshke Darande
- Nobitex
- Sentap
- Kimia Farma
- Chemicals And Allied Products
- exclusive
- South-Eastern Asia
- Indonesia
- Transportation
- Hensi
- Scania
- Europe
- Northern Europe
- Sweden
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Resistancetrench
- Israeli Air Force
- Israel Antiquities Authority
- Dienet
- Mirai
- Cve-2025-24016
- CVE-2025-24016
- United States
- Wazuh
- North America
- Clayoxtymus1337
- Technology
- Epsilor Electric Fuel
- Advanced Weapons And Equipment India
- Southern Asia
- India
- More_Eggs
- Fin6
- Cryptocurrency
- Alex Lab
- United Kingdom
- Zoldyck
- Edf Energy
- Critical Infrastructures
- Spearphishing Link
- Unix Shell
- Match Legitimate Name Or Location
- Credentials In Files
- Spectrum
- Ingress Tool Transfer
- Amos
- Disable Or Modify Tools
- Telecommunications
- Sudo And Sudo Caching
- Israel Defense Forces
- Food And Kindred Products
- Ghna
- Coca-Cola Europacific Partners
- Southern Europe
- Locauto
- Italy
- Automotive
- Mercadona
- Whitecoat
- Spain
- Ups
- Wow Health Solutions
- Healthcare
- Cyprus Airways
- Rip_Real_World
- Netsupport Rat
- Tel Aviv University
- Illeak
- Desec0X
- Numero
- Chaos
- Yashma
- Lucky_Gh0$T
- Unc6032
- Cyberlock
- 303
- Deloitte
- Gucci
- Virtualization/Sandbox Evasion
- System Information Discovery
- Screen Capture
- Password Managers
- Input Capture
- User Execution
- Drive-By Compromise
- Data From Local System
- Windows Credential Manager
- Credentials From Web Browsers
- File And Directory Discovery
- Obfuscated Files Or Information
- Exfiltration Over C2 Channel
- Command And Scripting Interpreter
- Phishing
- Credentials From Password Stores
- Eddiestealer
- W_Tchdogs
- Australia And New Zealand
- Superloop
- Australia
- Smb/Windows Admin Shares
- Resource Hijacking
- Network Service Discovery
- Change Default File Association
- Escape To Host
- Docker
- Remote System Discovery
- Web Protocols
- Lateral Tool Transfer
- Exploitation For Client Execution
- Deploy Container
- Exploit Public-Facing Application
- External Remote Services
- Financial Theft
- Cameleon
- Romania
- Venom Rat
- Eastern Europe
- Bitdefender
- CVE-2023-20118
- Cisco
- Cve-2023-20118
- Eastern Asia
- Vicioustrap
- Macao Special Administrative Region
- Tetraloader
- Trimble
- Uat-6382
- Cve-2025-0944
- CVE-2025-0944
- Scheduled Task
- Reflective Code Loading
- Silver Fox
- Process Discovery
- Valleyrat
- File Deletion
- Powershell
- Rundll32
- China
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Malicious File
- Dynamic-Link Library Injection
- Masquerade Task Or Service
- Regsvr32
- Danabot
- Trickbot
- Qakbot
- Warmcookie
- Bumblebee
- Cetus
- Purehvnc
- Bytebreaker
- Viralgod
- Mexico
- Telcel
- Latin America And The Caribbean
- Peter Green Chilled
- Cellcom
-
May 26, 2025
Vicioustrap Threat Actor Compromises Thousands of Network Devices
Cybersecurity researchers have uncovered a threat actor known as Vicioustrap, who has compromised approximately 5,300 network edge devices across 84 countries, primarily in Macau. This actor exploits a critical vulnerability (CVE-2023-20118) in various Cisco routers to redirect traffic to a honeypot-like infrastructure, allowing them to monitor and intercept network flows. The attack chain involves executing a shell script that facilitates adversary-in-the-middle attacks, with indications that the actor may be of Chinese-speaking origin. The ultimate goal of the Vicioustrap operation remains uncertain, although it is believed to be focused on creating a honeypot network.