GBHackers News: Your Top Source for Cybersecurity Insights

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 19, 2025 3 min read

Chinese Threat Actors Operate 2,800 Malicious Domains to Distribute Windows Malware

A sophisticated threat actor, dubbed "SilverFox," has been orchestrating a large-scale malware distribution campaign since at least June 2023, primarily targeting Chinese-speaking users. This group has registered approximately 2,800 malicious domains to facilitate the delivery of Windows malware. The operation includes a variety of malicious tools and tactics designed to evade detection, showcasing the evolving capabilities of cybercriminal organizations.

For further details, refer to the original reports on GBHackers and Cyber Press.

New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users

Cybercriminals are leveraging seemingly innocuous voicemail notifications to distribute malware. A recent phishing campaign impersonating Veeam Software exploits users' trust in enterprise messaging systems by delivering malicious payloads via weaponized WAV audio files. This method capitalizes on the familiarity of users with legitimate voicemail notifications, making it a significant threat.

For additional insights, see GBHackers and Cyber Press.

Phishing Attack

Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets

Infostealers like Lumma are specialized malware variants that routinely exfiltrate sensitive data from compromised systems. This includes session tokens, login credentials, and cryptocurrency wallet information. The stolen data is then sold on underground markets, posing a significant risk to both consumers and enterprises.

For more information, check out GBHackers and Cyber Press.

Lumma Infostealer

New Surge of Crypto-Jacking Hits Over 3,500 Websites

Cybersecurity experts have identified a resurgence in crypto-jacking attacks, which have infected over 3,500 websites with malicious JavaScript miners. This surge marks a notable evolution in tactics used by cybercriminals, indicating a shift back to exploiting web platforms for illicit cryptocurrency mining.

For further reading, refer to GBHackers and Cyber Press.

Crypto-Jacking

Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools

Fancy Bear, designated as APT28, is a sophisticated Russian cyberespionage group known for infiltrating government and military organizations. Recent intelligence reports indicate that they have intensified their operations, utilizing advanced tools to compromise sensitive networks and steal classified information.

For additional context, refer to GBHackers and Cyber Press.

Fancy Bear Hackers

Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials

The Snake Keylogger has surfaced as a threat targeting Turkish businesses, particularly those within the defense and aerospace sectors. This malicious tool evades Windows Defender and employs scheduled tasks to harvest credentials, posing a critical risk to organizational security.

For more details, see GBHackers and Cyber Press.

Snake Keylogger

MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems

The MITRE Corporation has introduced the AADAPT™ framework, designed to catalog and mitigate real-world attacks on digital asset payment technologies. This specialized knowledge base aims to enhance the resilience of digital asset systems against evolving cyber threats.

For additional insights, refer to the original post on GBHackers.

AADAPT Framework
Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers. Explore our services at https://www.gopher.security or contact us for more information on how we can enhance your organization's security posture.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article