<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Mark0</title>
    <description>The latest articles on Forem by Mark0 (@mark0_617b45cda9782a).</description>
    <link>https://forem.com/mark0_617b45cda9782a</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3702447%2F0301e2c9-634f-4567-8171-fd5d9da0b3aa.jpg</url>
      <title>Forem: Mark0</title>
      <link>https://forem.com/mark0_617b45cda9782a</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/mark0_617b45cda9782a"/>
    <language>en</language>
    <item>
      <title>JDownloader site hacked to replace installers with Python RAT malware</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Tue, 12 May 2026 05:01:24 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware-2f4o</link>
      <guid>https://forem.com/mark0_617b45cda9782a/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware-2f4o</guid>
      <description>&lt;p&gt;The official JDownloader website was recently compromised in a supply chain attack, resulting in the distribution of malicious Windows and Linux installers between May 6 and May 7, 2026. Attackers exploited an unpatched vulnerability in the site's content management system (CMS) to modify download links, redirecting users to third-party payloads. The breach specifically targeted the Windows 'Alternative Installer' and the Linux shell installer links, while other distribution methods like macOS packages and Flatpaks remained unaffected.&lt;/p&gt;

&lt;p&gt;Technical analysis revealed that the malicious Windows payload deploys an obfuscated Python-based remote access trojan (RAT) capable of executing modular code from command and control servers. On Linux, the installer was found to inject malicious code that downloads ELF binaries and establishes persistence by masquerading as system services. Given the level of access granted to the malware, researchers recommend that affected users perform a full operating system reinstallation and reset all credentials.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>malware</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>Google: Hackers used AI to develop zero-day exploit for web admin tool</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Tue, 12 May 2026 05:00:11 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool-1jdg</link>
      <guid>https://forem.com/mark0_617b45cda9782a/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool-1jdg</guid>
      <description>&lt;p&gt;Google Threat Intelligence Group (GTIG) has identified a zero-day exploit for an unnamed open-source web administration tool that was likely developed using AI. The exploit, designed to bypass two-factor authentication (2FA), featured Python code with characteristics typical of large language models (LLMs), such as educational docstrings and hallucinated CVSS scores. This discovery highlights a shift in threat actor methodology, moving towards AI-assisted vulnerability discovery for complex logic-based flaws.&lt;/p&gt;

&lt;p&gt;Beyond this specific incident, Google's report notes that state-sponsored actors from China, North Korea, and Russia are increasingly industrializing AI use. This includes generating decoy code to obfuscate malware like CANFAIL, utilizing voice cloning for social engineering, and integrating Gemini APIs into Android malware like PromptSpy for autonomous device interaction. To scale these operations, attackers are building automated infrastructure to manage access to premium AI models.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>ai</category>
      <category>exploit</category>
    </item>
    <item>
      <title>Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Tue, 12 May 2026 04:58:54 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/flash-alert-etherrat-and-tuktuk-c2-end-in-the-gentleman-ransomware-32jh</link>
      <guid>https://forem.com/mark0_617b45cda9782a/flash-alert-etherrat-and-tuktuk-c2-end-in-the-gentleman-ransomware-32jh</guid>
      <description>&lt;p&gt;In April, a sophisticated cyber intrusion was identified involving the deployment of EtherRAT via a malicious MSI installer masquerading as a Sysinternals tool. This campaign utilized the Ethereum blockchain through EtherHiding to dynamically update command-and-control (C2) configurations, effectively bypassing traditional network defenses. The attackers further deployed TukTuk, an AI-generated malware framework that leverages an array of SaaS platforms including ClickHouse, Supabase, and Arweave for resilient communication and dead-drop resolution.&lt;/p&gt;

&lt;p&gt;Following initial access, the threat actor engaged in extensive lateral movement using GoTo Resolve RMM and tools like NetExec. Sensitive data was exfiltrated to Wasabi cloud storage using Rclone before the intrusion culminated in the environment-wide deployment of The Gentleman ransomware via Group Policy Objects (GPO). The incident underscores a trend of threat actors adopting decentralized infrastructure and legitimate SaaS tools to mask malicious activities and complicate attribution.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://thedfirreport.com/2026/05/11/flash-alert-etherrat-and-tuktuk-c2-end-in-the-gentleman-ransomware/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>ransomware</category>
      <category>malware</category>
    </item>
    <item>
      <title>TrickMo Android banker adopts TON blockchain for covert comms</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Tue, 12 May 2026 04:57:38 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms-4k2n</link>
      <guid>https://forem.com/mark0_617b45cda9782a/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms-4k2n</guid>
      <description>&lt;p&gt;TrickMo, a long-standing Android banking malware, has evolved with a new variant labeled 'Trickmo.C' targeting users across Europe. Disguised as popular applications like TikTok, the malware aims to steal sensitive banking credentials and cryptocurrency wallet data. This version introduces sophisticated evasion techniques, including the use of The Open Network (TON) for decentralized command-and-control (C2) communications.&lt;/p&gt;

&lt;p&gt;By leveraging .ADNL addresses and an embedded TON proxy, the malware obscures its server infrastructure, making traditional domain takedowns and traffic analysis significantly harder. In addition to its core capabilities like screen recording and SMS interception, the new variant adds advanced networking tools such as SSH tunneling and SOCKS5 proxy support, marking a significant step up in its operational complexity.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>android</category>
      <category>malware</category>
    </item>
    <item>
      <title>The Accidental C2 - Exploring Dev Tunnels for Remote Access</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Tue, 12 May 2026 04:56:52 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/the-accidental-c2-exploring-dev-tunnels-for-remote-access-3oka</link>
      <guid>https://forem.com/mark0_617b45cda9782a/the-accidental-c2-exploring-dev-tunnels-for-remote-access-3oka</guid>
      <description>&lt;p&gt;This article explores the security implications of VS Code Dev Tunnels, demonstrating how they can be repurposed as an unintended Command and Control (C2) infrastructure. By deconstructing the multi-layered protocol—spanning REST management, WebSocket tunneling, SSH, and MsgPack-encoded RPC—the research reveals how an attacker can execute remote commands and manipulate files on a target system using legitimate Microsoft developer tools.&lt;/p&gt;

&lt;p&gt;The author introduces "Ouroboros," a custom Rust-based tool designed to list, interact with, and exploit existing dev tunnels. The research further highlights advanced attack paths, including the use of Entra ID Family of Client IDs (FOCI) and Broker-based Nested App Authentication (BroCI) to pivot from standard application tokens to dev tunnel access, providing a potent vector for initial access and lateral movement.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://blog.xpnsec.com/accidental-c2/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>devtunnels</category>
      <category>vscode</category>
    </item>
    <item>
      <title>GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Tue, 12 May 2026 04:55:52 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/gtig-ai-threat-tracker-adversaries-leverage-ai-for-vulnerability-exploitation-augmented-2n3d</link>
      <guid>https://forem.com/mark0_617b45cda9782a/gtig-ai-threat-tracker-adversaries-leverage-ai-for-vulnerability-exploitation-augmented-2n3d</guid>
      <description>&lt;p&gt;Google Threat Intelligence Group (GTIG) reports a significant maturation in how adversaries leverage AI, shifting from initial experimentation to industrial-scale application in cyber operations. This report, based on insights from Mandiant, Gemini, and GTIG research, highlights AI's dual role: it serves as a sophisticated engine for adversary operations and concurrently as a high-value target for attacks. Key developments include AI-augmented vulnerability discovery, advanced defense evasion techniques, and autonomous malware operations.&lt;/p&gt;

&lt;p&gt;Adversaries are now using AI for zero-day exploit development, accelerating polymorphic malware creation, and orchestrating autonomous attacks like PROMPTSPY for system navigation and decision-making. AI also enhances reconnaissance, information operations (e.g., deepfakes), and provides obfuscated, scalable access to LLMs for malicious activities. Furthermore, the AI ecosystem itself is a target, with supply chain attacks leveraging compromised components and malicious AI agent skills. Google actively counters these threats through product safeguards, AI-powered defenses like Big Sleep and CodeMender, and industry collaboration via the Secure AI Framework (SAIF) and Coalition for Secure AI (CoSAI).&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>ai</category>
      <category>threatintelligence</category>
    </item>
    <item>
      <title>2026-05-08: macOS Shub Stealer infection</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Mon, 11 May 2026 04:54:48 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/2026-05-08-macos-shub-stealer-infection-3oi</link>
      <guid>https://forem.com/mark0_617b45cda9782a/2026-05-08-macos-shub-stealer-infection-3oi</guid>
      <description>&lt;p&gt;This technical analysis outlines a macOS Shub Stealer infection occurring on May 8, 2026. The compromise follows a social engineering path where a Google search leads users to a malicious Google Drive document, which then redirects to a fraudulent "Download for macOS" landing page. The victim is then prompted to manually execute a script via their terminal, initiating the malware's deployment.&lt;/p&gt;

&lt;p&gt;The report highlights key forensic artifacts, including specific log files generated during the infection and network traffic captured in Wireshark. For deep-dive investigation, the author has provided associated IOCs, packet captures (pcap), and the malware samples themselves, allowing analysts to examine the exfiltration methods used by this infostealer.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.malware-traffic-analysis.net/2026/05/08/index.html" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>macos</category>
      <category>malware</category>
    </item>
    <item>
      <title>What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Mon, 11 May 2026 04:53:51 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/what-is-the-instructure-canvas-breach-impact-risks-and-what-institutions-should-do-5d3o</link>
      <guid>https://forem.com/mark0_617b45cda9782a/what-is-the-instructure-canvas-breach-impact-risks-and-what-institutions-should-do-5d3o</guid>
      <description>&lt;p&gt;⚠️ &lt;strong&gt;Region Alert: UAE/Middle East&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In May 2026, the threat group SHADOW-AETHER-015 breached Instructure's Canvas platform, exposing data from over 8,800 institutions across 50 countries. The breach affects a wide range of educational and medical organizations, including all eight Ivy League universities and over 1,600 K-12 districts. The leak originated from backend infrastructure, potentially compromising highly sensitive student disclosures, medical accommodation requests, and private academic conversations.&lt;/p&gt;

&lt;p&gt;The primary concern following this incident is the risk of sophisticated spear-phishing and social engineering attacks. Because the stolen data includes specific institutional context and private message histories, threat actors can craft highly convincing fraudulent communications. Organizations are advised to re-authorize API integrations, enforce multi-factor authentication, and prepare for potential regulatory implications under FERPA, COPPA, and HIPAA.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.trendmicro.com/en_us/research/26/e/What-Is-the-Instructure-Canvas-Breach.html" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>databreach</category>
      <category>threatintel</category>
    </item>
    <item>
      <title>CVE-2025-68670: discovering an RCE vulnerability in xrdp</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Mon, 11 May 2026 04:52:54 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp-1c61</link>
      <guid>https://forem.com/mark0_617b45cda9782a/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp-1c61</guid>
      <description>&lt;p&gt;Kaspersky researchers have identified a critical remote code execution (RCE) vulnerability in the xrdp open-source remote desktop server, tracked as CVE-2025-68670. The vulnerability occurs during the Secure Settings Exchange phase, specifically within the &lt;code&gt;xrdp_wm_parse_domain_information&lt;/code&gt; function. Because the flaw is triggered before the authentication process is completed, it presents a significant risk by allowing unauthenticated attackers to potentially compromise the server process.&lt;/p&gt;

&lt;p&gt;The technical root cause is a stack buffer overflow. While the xrdp server converts domain strings from UTF-16 to UTF-8, it fails to properly validate the length of the domain name before copying it into a 256-byte stack buffer. Although modern compiler mitigations like stack canaries can hinder exploitation, researchers demonstrated a successful proof-of-concept. Maintainers have patched the issue in version 0.10.5 and backported security fixes to versions 0.9.27 and 0.10.4.1.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://securelist.com/cve-2025-68670/119742/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>linux</category>
      <category>rce</category>
    </item>
    <item>
      <title>The Good, the Bad and the Ugly in Cybersecurity – Week 19</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Mon, 11 May 2026 04:51:54 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/the-good-the-bad-and-the-ugly-in-cybersecurity-week-19-4iej</link>
      <guid>https://forem.com/mark0_617b45cda9782a/the-good-the-bad-and-the-ugly-in-cybersecurity-week-19-4iej</guid>
      <description>&lt;p&gt;Federal authorities have successfully sentenced Deniss Zolotarjovs, a key negotiator for the Karakurt extortion syndicate, to nearly nine years in prison for his role in coercing victims using stolen sensitive data. In a related crackdown on state-sponsored activities, two American nationals were also sentenced for facilitating laptop farms that allowed North Korean IT workers to infiltrate U.S. companies and siphon funds to the sanctioned regime.&lt;/p&gt;

&lt;p&gt;Technically, SentinelLABS researchers uncovered PCPJack, a sophisticated cloud worm designed to harvest a wide range of credentials and evict competing threat actors from compromised infrastructure. Additionally, a critical zero-day vulnerability (CVE-2026-0300) in Palo Alto Networks' PAN-OS is currently under active exploitation, posing a significant risk of remote code execution across thousands of exposed edge devices.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-19-7/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>cloudsecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Mon, 11 May 2026 04:51:00 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromise-3hip</link>
      <guid>https://forem.com/mark0_617b45cda9782a/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromise-3hip</guid>
      <description>&lt;p&gt;Quasar Linux RAT (QLNX) is a sophisticated Linux implant designed to target developers and DevOps infrastructure. It focuses on stealing credentials from sensitive files like .npmrc, .aws/credentials, and Kubernetes configs, potentially allowing attackers to poison software registries or access cloud environments. The malware operates with high stealth, using fileless execution and masquerading as kernel threads to establish a silent foothold.&lt;/p&gt;

&lt;p&gt;Technically, QLNX employs a multi-layered approach for persistence and evasion, utilizing seven different methods including systemd, crontab, and .bashrc injection. It features a two-tiered rootkit architecture combining userland LD_PRELOAD and kernel-level eBPF components to hide its presence from standard system tools. With support for 58 commands and PAM-based credential interception, it provides operators with comprehensive control over compromised hosts while maintaining long-term stealth.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>linux</category>
      <category>malware</category>
    </item>
    <item>
      <title>CISA gives feds four days to patch Ivanti flaw exploited as zero-day</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Mon, 11 May 2026 04:50:19 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day-3lb3</link>
      <guid>https://forem.com/mark0_617b45cda9782a/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day-3lb3</guid>
      <description>&lt;p&gt;CISA has issued an urgent directive for U.S. federal agencies to secure Ivanti Endpoint Manager Mobile (EPMM) systems against CVE-2026-6973. This high-severity vulnerability enables remote code execution (RCE) for attackers with administrative privileges. The security flaw is currently being exploited in zero-day attacks, prompting a rapid patching mandate with a deadline of May 10.&lt;/p&gt;

&lt;p&gt;Ivanti has released updates for versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 to address the issue. This latest vulnerability follows a series of critical flaws in the EPMM product line targeted by attackers earlier this year. Security organizations report that over 800 appliances remain exposed online, and administrators are advised to rotate credentials and audit accounts with administrative rights.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>vulnerability</category>
      <category>ivanti</category>
    </item>
  </channel>
</rss>
