Post

Security Affairs Newsletter Round 526: International Edition by Pierluigi Paganini

Security Affairs Newsletter Round 526: International Edition by Pierluigi Paganini

TL;DR

The latest Security Affairs newsletter highlights critical cybersecurity incidents, including data breaches, state-sponsored attacks, and new malware threats. Key points cover vulnerabilities in Linux, nation-state cyberattacks, and global cybercrime operations.

Main Content

A New Round of the Weekly Security Affairs Newsletter Has Arrived!

Enjoy the latest edition of the weekly Security Affairs newsletter, featuring top security articles and international press coverage.

International Press – Newsletter

Cybercrime

DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers

The Epic Rise and Fall of a Dark-Web Psychedelics Kingpin

Threat Spotlight: Hijacked Routers and Fake Searches Fueling Payroll Heist

Dark Partners cybercrime gang fuels large-scale crypto heists

ConnectWise Confirms ScreenConnect Cyberattack, Says Systems Now Secure: Exclusive

Infrastructure Used to Manage Domains Related to Cryptocurrency Investment Fraud Scams between October 2023 and April 2025

Steal, deal and repeat: How cybercriminals trade and exploit your data

Websites selling hacking tools to cybercriminals seized

Malware

60 Malicious npm Packages Leak Network and Host Data in Active Malware Campaign

Inside a VenomRAT Malware Campaign

Fake Google Meet Page Tricks Users into Running PowerShell Malware

PyBitmessage Backdoor Malware Installed with CoinMiner

PumaBot: Novel Botnet Targeting IoT Surveillance Devices

GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers

Hacking

Sugar-Coated Poison: Benign Generation Unlocks LLM Jailbreaking

The Sharp Taste of Mimo’lette: Analyzing Mimo’s Latest Campaign targeting Craft CMS

From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

Qualys TRU Discovers Two Local Information Disclosure Vulnerabilities in Apport and systemd-coredump: CVE-2025-5054 and CVE-2025-4598

Intelligence and Information Warfare

China-Nexus Threat Actor Actively Exploiting Ivanti Endpoint Manager Mobile (CVE-2025-4428) Vulnerability

Mysterious hacking group Careto was run by the Spanish government, sources say

Russian hacker group Killnet returns with new identity

New Russia-affiliated actor Void Blizzard targets critical sectors for espionage

Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents

AIVD and MIVD recognize new Russian cyber actor

Chinese spies blamed for attempted hack on Czech government network

Mark Your Calendar: APT41 Innovative Tactics

Earth Lamia Develops Custom Arsenal to Target Multiple Industries

Lazarus Group Targets Crypto-Wallets and Financial Data while employing new Tradecrafts

Cybersecurity

The App Store prevented more than $9 billion in fraudulent transactions over the last five years

Cyber: Statement by the High Representative on behalf of the European Union on malicious behaviour in cyberspace against Czechia

Anthropic’s new AI model turns to blackmail when engineers try to take it offline

Victoria’s Secret Website Taken Offline After Cyberattack

Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more

Treasury Takes Action Against Major Cyber Scam Facilitator

Integrity Reports, First Quarter 2025

Meta’s Adversarial Threat Report, First Quarter 2025

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

Conclusion

The latest Security Affairs newsletter underscores the critical importance of staying informed about the ever-evolving landscape of cybersecurity threats. From nation-state attacks to innovative malware campaigns, the insights provided are essential for both individuals and organizations aiming to bolster their defenses against cyber threats. As the digital world continues to expand, so does the need for robust cybersecurity measures to protect against these growing risks.

References

This post is licensed under CC BY 4.0 by the author.