Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://feeds.feedburner.com/krebsonsecurity/TEjH

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. >
  9.  
  10. <channel>
  11. <title>Krebs on Security</title>
  12. <atom:link href="https://krebsonsecurity.com/feed/" rel="self" type="application/rss+xml" />
  13. <link>https://krebsonsecurity.com</link>
  14. <description>In-depth security news and investigation</description>
  15. <lastBuildDate>Sat, 01 Nov 2025 14:28:23 +0000</lastBuildDate>
  16. <language>en-US</language>
  17. <sy:updatePeriod>
  18. hourly </sy:updatePeriod>
  19. <sy:updateFrequency>
  20. 1 </sy:updateFrequency>
  21. <generator>https://wordpress.org/?v=6.2.2</generator>
  22. <item>
  23. <title>Aisuru Botnet Shifts from DDoS to Residential Proxies</title>
  24. <link>https://krebsonsecurity.com/2025/10/aisuru-botnet-shifts-from-ddos-to-residential-proxies/</link>
  25. <comments>https://krebsonsecurity.com/2025/10/aisuru-botnet-shifts-from-ddos-to-residential-proxies/#comments</comments>
  26. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  27. <pubDate>Wed, 29 Oct 2025 00:51:05 +0000</pubDate>
  28. <category><![CDATA[A Little Sunshine]]></category>
  29. <category><![CDATA[DDoS-for-Hire]]></category>
  30. <category><![CDATA[Internet of Things (IoT)]]></category>
  31. <category><![CDATA[The Coming Storm]]></category>
  32. <category><![CDATA[Web Fraud 2.0]]></category>
  33. <category><![CDATA[360Proxy]]></category>
  34. <category><![CDATA[911Proxy]]></category>
  35. <category><![CDATA[922Proxy]]></category>
  36. <category><![CDATA[ABCProxy]]></category>
  37. <category><![CDATA[Aisuru botnet]]></category>
  38. <category><![CDATA[Benjamin Brundage]]></category>
  39. <category><![CDATA[Bright Data]]></category>
  40. <category><![CDATA[Cherry Proxy]]></category>
  41. <category><![CDATA[Denas Grybauskas]]></category>
  42. <category><![CDATA[google]]></category>
  43. <category><![CDATA[HK Network]]></category>
  44. <category><![CDATA[internet of things]]></category>
  45. <category><![CDATA[IP2World]]></category>
  46. <category><![CDATA[LibreNews]]></category>
  47. <category><![CDATA[LunaProxy]]></category>
  48. <category><![CDATA[NETSCOUT]]></category>
  49. <category><![CDATA[Oxylabs]]></category>
  50. <category><![CDATA[Philippe Caturegli]]></category>
  51. <category><![CDATA[PIA S5 Proxy]]></category>
  52. <category><![CDATA[PyProxy]]></category>
  53. <category><![CDATA[Reddit]]></category>
  54. <category><![CDATA[residential proxy]]></category>
  55. <category><![CDATA[Riley Kilmer]]></category>
  56. <category><![CDATA[roland dobbins]]></category>
  57. <category><![CDATA[Roxlabs]]></category>
  58. <category><![CDATA[Seralys]]></category>
  59. <category><![CDATA[spur.us]]></category>
  60. <category><![CDATA[Synthient]]></category>
  61. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72424</guid>
  62.  
  63. <description><![CDATA[Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy services that help cybercriminals anonymize their traffic. Experts says a glut of proxies from Aisuru and other sources is fueling large-scale data harvesting efforts tied to various artificial intelligence (AI) projects, helping content scrapers evade detection by routing their traffic through residential connections that appear to be regular Internet users.]]></description>
  64. <content:encoded><![CDATA[<p><strong>Aisuru</strong>, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to support a more low-key, lucrative and sustainable business: Renting hundreds of thousands of infected Internet of Things (IoT) devices to proxy services that help cybercriminals anonymize their traffic. Experts say a glut of proxies from Aisuru and other sources is fueling large-scale data harvesting efforts tied to various artificial intelligence (AI) projects, helping content scrapers evade detection by routing their traffic through residential connections that appear to be regular Internet users.</p>
  65. <p><img decoding="async" class="aligncenter wp-image-72438" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/aisuru-ipidea.png" alt="Image credit: vxdb" width="749" height="415" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/aisuru-ipidea.png 1421w, https://krebsonsecurity.com/wp-content/uploads/2025/10/aisuru-ipidea-768x425.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/aisuru-ipidea-782x433.png 782w" sizes="(max-width: 749px) 100vw, 749px" /></p>
  66. <p>First identified in August 2024, Aisuru has spread to at least 700,000 IoT systems, such as poorly secured Internet routers and security cameras. Aisuru&#8217;s overlords have used their massive botnet to clobber targets with headline-grabbing DDoS attacks, flooding targeted hosts with blasts of junk requests from all infected systems simultaneously.</p>
  67. <p>In June, Aisuru hit KrebsOnSecurity.com with a DDoS <a href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" target="_blank" rel="noopener">clocking at 6.3 terabits per second</a> &#8212; the biggest attack that <strong>Google</strong> had ever mitigated at the time. In the weeks and months that followed, Aisuru&#8217;s operators demonstrated DDoS capabilities of nearly 30 terabits of data per second &#8212; well beyond the attack mitigation capabilities of most Internet destinations.</p>
  68. <p>These digital sieges have been particularly disruptive this year for U.S.-based Internet service providers (ISPs), in part because Aisuru recently succeeded in <a href="https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/" target="_blank" rel="noopener">taking over a large number of IoT devices in the United States</a>. And when Aisuru launches attacks, the volume of outgoing traffic from infected systems on these ISPs is often so high that it can disrupt or degrade Internet service for adjacent (non-botted) customers of the ISPs.</p>
  69. <p>&#8220;Multiple broadband access network operators have experienced significant operational impact due to outbound DDoS attacks in excess of 1.5Tb/sec launched from Aisuru botnet nodes residing on end-customer premises,&#8221; wrote <strong>Roland Dobbins</strong>, principal engineer at <strong>Netscout</strong>, in a recent <a href="https://www.netscout.com/blog/asert/asert-threat-summary-aisuru-and-related-turbomirai-botnet-ddos" target="_blank" rel="noopener">executive summary on Aisuru</a>. &#8220;Outbound/crossbound attack traffic exceeding 1Tb/sec from compromised customer premise equipment (CPE) devices has caused significant disruption to wireline and wireless broadband access networks. High-throughput attacks have caused chassis-based router line card failures.&#8221;</p>
  70. <p>The incessant attacks from Aisuru have caught the attention of federal authorities in the United States and Europe (many of Aisuru&#8217;s victims are customers of ISPs and hosting providers based in Europe). Quite recently, some of the world&#8217;s largest ISPs have started informally sharing block lists identifying the rapidly shifting locations of the servers that the attackers use to control the activities of the botnet.</p>
  71. <p>Experts say the Aisuru botmasters recently updated their malware so that compromised devices can more easily be rented to so-called &#8220;<strong>residential proxy</strong>&#8221; providers. These proxy services allow paying customers to route their Internet communications through someone else&#8217;s device, providing anonymity and the ability to appear as a regular Internet user in almost any major city worldwide.</p>
  72. <p><img decoding="async" loading="lazy" class="aligncenter wp-image-31323" src="https://krebsonsecurity.com/wp-content/uploads/2015/06/proxy.png" alt="" width="631" height="264" /></p>
  73. <p>From a website’s perspective, the IP traffic of a residential proxy network user appears to originate from the rented residential IP address, not from the proxy service customer. Proxy services can be used in a legitimate manner for several business purposes — such as price comparisons or sales intelligence. But they are massively abused for hiding cybercrime activity (think advertising fraud, credential stuffing) because they can make it difficult to trace malicious traffic to its original source.</p>
  74. <p>And as we&#8217;ll see in a moment, this entire shadowy industry appears to be shifting its focus toward enabling aggressive content scraping activity that continuously feeds raw data into large language models (LLMs) built to support various AI projects.</p>
  75. <h2>&#8216;INSANE&#8217; GROWTH</h2>
  76. <p><strong>Riley Kilmer</strong> is co-founder of <a href="https://spur.us" target="_blank" rel="noopener">spur.us</a>, a service that tracks proxy networks. Kilmer said all of the top proxy services have grown substantially over the past six months.</p>
  77. <p>&#8220;I just checked, and in the last 90 days we&#8217;ve seen 250 million unique residential proxy IPs,&#8221; Kilmer said. &#8220;That is insane. That is so high of a number, it&#8217;s unheard of. These proxies are absolutely everywhere now.&#8221;</p>
  78. <p>Today, Spur says it is tracking an unprecedented spike in available proxies across all providers, including;</p>
  79. <p>LUMINATI_PROXY    11,856,421<br />
  80. NETNUT_PROXY    10,982,458<br />
  81. ABCPROXY_PROXY    9,294,419<br />
  82. OXYLABS_PROXY     6,754,790<br />
  83. IPIDEA_PROXY     3,209,313<br />
  84. EARNFM_PROXY    2,659,913<br />
  85. NODEMAVEN_PROXY    2,627,851<br />
  86. INFATICA_PROXY    2,335,194<br />
  87. IPROYAL_PROXY    2,032,027<br />
  88. YILU_PROXY    1,549,155<span id="more-72424"></span></p>
  89. <p>Reached for comment about the apparent rapid growth in their proxy network, Oxylabs (#4 on Spur&#8217;s list) said while their proxy pool did grow recently, it did so at nowhere near the rate cited by Spur.</p>
  90. <p>&#8220;We don’t systematically track other providers’ figures, and we’re not aware of any instances of 10× or 100× growth, especially when it comes to a few bigger companies that are legitimate businesses,&#8221; the company said in a written statement.</p>
  91. <p><strong>Bright Data</strong> was formerly known as <strong>Luminati Networks</strong>, the name that is currently at the top of Spur&#8217;s list of the biggest residential proxy networks. Bright Data likewise told KrebsOnSecurity that Spur&#8217;s current estimates of its proxy network are dramatically overstated and inaccurate.</p>
  92. <p>&#8220;We did not actively initiate nor do we see any 10x or 100x expansion of our network, which leads me to believe that someone might be presenting these IPs as Bright Data&#8217;s in some way,&#8221; said <strong>Rony Shalit</strong>, Bright Data&#8217;s chief compliance and ethics officer. &#8220;In many cases in the past, due to us being the leading data collection proxy provider, IPs were falsely tagged as being part of our network, or while being used by other proxy providers for malicious activity.&#8221;</p>
  93. <p>&#8220;Our network is only sourced from verified IP providers and <a href="https://brightdata.com/trustcenter/bright-sdk-ethical-data-practices" target="_blank" rel="noopener">a robust opt-in only residential peers</a>, which we work hard and in complete transparency to obtain,&#8221; Shalit continued. &#8220;Every DC, ISP or SDK partner is reviewed and approved, and every residential peer must actively opt in to be part of our network.&#8221;</p>
  94. <h2>HK NETWORK</h2>
  95. <p>Even Spur acknowledges that Luminati and Oxylabs are unlike most other proxy services on their top proxy providers list, in that these providers actually adhere to &#8220;know-your-customer&#8221; policies, such as requiring video calls with all customers, and strictly blocking customers from reselling access.</p>
  96. <p><strong>Benjamin Brundage</strong> is founder of <a href="https://synthient.com" target="_blank" rel="noopener">Synthient</a>, a startup that helps companies detect proxy networks. Brundage said if there is increasing confusion around which proxy networks are the most worrisome, it&#8217;s because nearly all of these lesser-known proxy services have evolved into highly incestuous bandwidth resellers. What&#8217;s more, he said, some proxy providers do not appreciate being tracked and have been known to take aggressive steps to confuse systems that scan the Internet for residential proxy nodes.</p>
  97. <p>Brundage said most proxy services today have created their own <strong>software development kit</strong> or SDK that other app developers can bundle with their code to earn revenue. These SDKs quietly modify the user&#8217;s device so that some portion of their bandwidth can be used to forward traffic from proxy service customers.</p>
  98. <p>&#8220;Proxy providers have pools of constantly churning IP addresses,&#8221; he said. &#8220;These IP addresses are sourced through various means, such as bandwidth-sharing apps, botnets, Android SDKs, and more. These providers will often either directly approach resellers or offer a reseller program that allows users to resell bandwidth through their platform.&#8221;</p>
  99. <p>Many SDK providers say they require full consent before allowing their software to be installed on end-user devices. Still, those opt-in agreements and consent checkboxes may be little more than a formality for cybercriminals like the Aisuru botmasters, who can earn a commission each time one of their infected devices is <em>forced to install</em> some SDK that enables one or more of these proxy services.</p>
  100. <p>Depending on its structure, a single provider may operate hundreds of different proxy pools at a time &#8212; all maintained through other means, Brundage said.</p>
  101. <p>&#8220;Often, you&#8217;ll see resellers maintaining their own proxy pool in addition to an upstream provider,&#8221; he said. &#8220;It allows them to market a proxy pool to high-value clients and offer an unlimited bandwidth plan for cheap reduce their own costs.&#8221;</p>
  102. <p>Some proxy providers appear to be directly in league with botmasters. Brundage identified one proxy seller that was aggressively advertising cheap and plentiful bandwidth to content scraping companies. After scanning that provider&#8217;s pool of available proxies, Brundage said he found a one-to-one match with IP addresses he&#8217;d previously mapped to the Aisuru botnet.</p>
  103. <p>Brundage says that by almost any measurement, the world&#8217;s largest residential proxy service is <strong>IPidea</strong>, a China-based proxy network. IPidea is #5 on Spur&#8217;s Top 10, and Brundage said its brands include <strong>ABCProxy </strong>(#3), <strong>Roxlabs</strong>, <strong>LunaProxy</strong>, <strong>PIA S5 Proxy</strong>, <strong>PyProxy</strong>, <strong>922Proxy</strong>, <strong>360Proxy</strong>, <strong>IP2World</strong>, and <strong>Cherry Proxy. </strong>Spur&#8217;s Kilmer said they also track <strong>Yilu Proxy </strong>(#10) as IPidea.</p>
  104. <p>Brundage said all of these providers operate under a corporate umbrella known on the cybercrime forums as &#8220;<strong>HK Network</strong>.&#8221;</p>
  105. <p>&#8220;The way it works is there&#8217;s this whole reseller ecosystem, where IPidea will be incredibly aggressive and approach all these proxy providers with the offer, &#8216;Hey, if you guys buy bandwidth from us, we&#8217;ll give you these amazing reseller prices,'&#8221; Brundage explained. &#8220;But they&#8217;re also very aggressive in recruiting resellers for their apps.&#8221;</p>
  106. <div id="attachment_72441" style="width: 760px" class="wp-caption aligncenter"><a href="https://krebsonsecurity.com/wp-content/uploads/2025/10/synthient-hknetwork.png" target="_blank" rel="noopener"><img aria-describedby="caption-attachment-72441" decoding="async" loading="lazy" class="wp-image-72441" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/synthient-hknetwork.png" alt="" width="750" height="517" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/synthient-hknetwork.png 1126w, https://krebsonsecurity.com/wp-content/uploads/2025/10/synthient-hknetwork-768x529.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/synthient-hknetwork-782x539.png 782w, https://krebsonsecurity.com/wp-content/uploads/2025/10/synthient-hknetwork-100x70.png 100w" sizes="(max-width: 750px) 100vw, 750px" /></a><p id="caption-attachment-72441" class="wp-caption-text">A graphic depicting the relationship between proxy providers that Synthient found are white labeling IPidea proxies. Image: Synthient.com.</p></div>
  107. <p>Those apps include a range of low-cost and &#8220;free&#8221; virtual private networking (VPN) services that indeed allow users to enjoy a free VPN, but which also turn the user&#8217;s device into a traffic relay that can be rented to cybercriminals, or else parceled out to countless other proxy networks.</p>
  108. <p>&#8220;They have all this bandwidth to offload,&#8221; Brundage said of IPidea and its sister networks. &#8220;And they can do it through their own platforms, or they go get resellers to do it for them by advertising on sketchy hacker forums to reach more people.&#8221;</p>
  109. <p>One of IPidea&#8217;s core brands is <strong>922S5Proxy</strong>, which is a not-so-subtle nod to the <strong>911S5Proxy</strong> service that was hugely popular between 2015 and 2022. In July 2022, KrebsOnSecurity published <a href="https://krebsonsecurity.com/2022/07/a-deep-dive-into-the-residential-proxy-service-911/" target="_blank" rel="noopener">a deep dive into 911S5Proxy&#8217;s origins and apparent owners in China</a>. Less than a week later, 911S5Proxy announced it was closing down after <a href="https://krebsonsecurity.com/2022/07/911-proxy-service-implodes-after-disclosing-breach/" target="_blank" rel="noopener">the company&#8217;s servers were massively hacked</a>.</p>
  110. <p>That 2022 story named <strong>Yunhe Wang</strong> from Beijing as the apparent owner and/or manager of the 911S5 proxy service. In May 2024, the <strong>U.S. Department of Justice</strong> <a href="https://krebsonsecurity.com/2024/05/treasury-sanctions-creators-of-911-s5-proxy-botnet/" target="_blank" rel="noopener">arrested Mr Wang</a>, alleging that his network was used to steal billions of dollars from financial institutions, credit card issuers, and federal lending programs. At the same time, the U.S. Treasury Department announced sanctions against Wang and two other Chinese nationals for operating 911S5Proxy.</p>
  111. <div id="attachment_72454" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72454" decoding="async" loading="lazy" class=" wp-image-72454" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/922proxy.png" alt="" width="749" height="494" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/922proxy.png 1182w, https://krebsonsecurity.com/wp-content/uploads/2025/10/922proxy-768x507.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/922proxy-782x516.png 782w" sizes="(max-width: 749px) 100vw, 749px" /><p id="caption-attachment-72454" class="wp-caption-text">The website for 922Proxy.</p></div>
  112. <h2>DATA SCRAPING FOR AI</h2>
  113. <p>In recent months, multiple experts who track botnet and proxy activity have shared that a great deal of content scraping which ultimately benefits AI companies is now leveraging these proxy networks to further obfuscate their aggressive data-slurping activity. That&#8217;s because by routing it through residential IP addresses, content scraping firms can make their traffic far trickier to filter out.</p>
  114. <p>&#8220;It&#8217;s really difficult to block, because there&#8217;s a risk of blocking real people,&#8221; Spur&#8217;s Kilmer said of the LLM scraping activity that is fed through individual residential IP addresses, which are often shared by multiple customers at once.</p>
  115. <p>Kilmer says the AI industry has brought a veneer of legitimacy to residential proxy business, which has heretofore mostly been associated with sketchy affiliate money making programs, automated abuse, and unwanted Internet traffic.</p>
  116. <p><span class="pullquote pqleft">&#8220;Web crawling and scraping has always been a thing, but AI made it like a commodity, data that had to be collected,&#8221; Kilmer said.</span> &#8220;Everybody wanted to monetize their own data pots, and how they monetize that is different across the board.&#8221;</p>
  117. <p>Kilmer said many LLM-related scrapers rely on residential proxies in cases where the content provider has restricted access to their platform in some way, such as forcing interaction through an app, or keeping all content behind a login page with multi-factor authentication.</p>
  118. <p>&#8220;Where the cost of data is out of reach &#8212; there is some exclusivity or reason they can&#8217;t access the data &#8212; they&#8217;ll turn to residential proxies so they look like a real person accessing that data,&#8221; Kilmer said of the content scraping efforts.</p>
  119. <p>Aggressive AI crawlers increasingly <a href="https://arstechnica.com/ai/2025/03/devs-say-ai-crawlers-dominate-traffic-forcing-blocks-on-entire-countries/" target="_blank" rel="noopener">are overloading community-maintained infrastructure</a>, causing what amounts to persistent DDoS attacks on vital public resources. A <a href="https://thelibre.news/foss-infrastructure-is-under-attack-by-ai-companies/" target="_blank" rel="noopener">report</a> earlier this year from <strong>LibreNews</strong> found some open-source projects now see as much as 97 percent of their traffic originating from AI company bots, dramatically increasing bandwidth costs, service instability, and burdening already stretched-thin maintainers.</p>
  120. <p><strong>Cloudflare</strong> is now experimenting with tools that will allow content creators to charge a fee to AI crawlers to scrape their websites. The company&#8217;s &#8220;<a href="https://developers.cloudflare.com/ai-crawl-control/features/pay-per-crawl/what-is-pay-per-crawl/" target="_blank" rel="noopener">pay-per-crawl</a>&#8221; feature is currently in a private beta, and it lets publishers set their own prices that bots must pay before scraping content.</p>
  121. <p>On October 22, the social media and news network <strong>Reddit</strong> <a href="https://redditinc.com/hubfs/Reddit%20Inc/Content/Reddit%20v.%20SerpApi.pdf" target="_blank" rel="noopener">sued Oxylabs (PDF)</a> and several other proxy providers, alleging that their systems enabled the mass-scraping of Reddit user content even though Reddit had taken steps to block such activity.</p>
  122. <p>&#8220;Recognizing that Reddit denies scrapers like them access to its site, Defendants scrape the data from Google’s search results instead,&#8221; the lawsuit alleges. &#8220;They do so by masking their identities, hiding their locations, and disguising their web scrapers as regular people (among other techniques) to circumvent or bypass the security restrictions meant to stop them.&#8221;</p>
  123. <p><strong>Denas Grybauskas</strong>, chief governance and strategy officer at Oxylabs, said the company was shocked and disappointed by the lawsuit.</p>
  124. <p>&#8220;Reddit has made no attempt to speak with us directly or communicate any potential concerns,&#8221; Grybauskas said in a written statement. &#8220;Oxylabs has always been and will continue to be a pioneer and an industry leader in public data collection, and it will not hesitate to defend itself against these allegations. Oxylabs’ position is that no company should claim ownership of public data that does not belong to them. It is possible that it is just an attempt to sell the same public data at an inflated price.&#8221;</p>
  125. <p>As big and powerful as Aisuru may be, it is hardly the only botnet that is contributing to the overall broad availability of residential proxies. For example, on June 5 the FBI’s <strong>Internet Crime Complaint Center</strong> <a href="https://www.ic3.gov/PSA/2025/PSA250605" target="_blank" rel="noopener">warned</a> that an IoT malware threat dubbed <a href="https://www.humansecurity.com/learn/blog/satori-threat-intelligence-disruption-badbox-2-0/" target="_blank" rel="noopener">BADBOX 2.0</a> had compromised millions of smart-TV boxes, digital projectors, vehicle infotainment units, picture frames, and other IoT devices.</p>
  126. <p>In July, Google filed <a href="https://www.courtlistener.com/docket/70683171/google-llc-v-does-1-25/" target="_blank" rel="noopener">a lawsuit</a> in New York federal court against the Badbox botnet&#8217;s alleged perpetrators. Google said the Badbox 2.0 botnet &#8220;compromised more than 10 million uncertified devices running Android&#8217;s open-source software, which lacks Google&#8217;s security protections. Cybercriminals infected these devices with pre-installed malware and exploited them to conduct large-scale ad fraud and other digital crimes.&#8221;</p>
  127. <h2>A FAMILIAR DOMAIN NAME</h2>
  128. <p>Brundage said the Aisuru botmasters have their own SDK, and for some reason part of its code tells many newly-infected systems to query the domain name <strong>fuckbriankrebs[.]com</strong>. This may be little more than an elaborate &#8220;screw you&#8221; to this site&#8217;s author: One of the botnet&#8217;s alleged partners goes by the handle &#8220;<strong>Forky</strong>,&#8221; and was <a href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" target="_blank" rel="noopener">identified in June by KrebsOnSecurity as a young man from Sao Paulo, Brazil</a>.</p>
  129. <p>Brundage noted that only systems infected with Aisuru&#8217;s Android SDK will be forced to resolve the domain. Initially, there was some discussion about whether the domain might have some utility as a &#8220;kill switch&#8221; capable of disrupting the botnet&#8217;s operations, although Brundage and others interviewed for this story say that is unlikely.</p>
  130. <div id="attachment_72457" style="width: 745px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72457" decoding="async" loading="lazy" class="wp-image-72457 " src="https://krebsonsecurity.com/wp-content/uploads/2025/10/fbk-seralys-r.png" alt="" width="735" height="707" /><p id="caption-attachment-72457" class="wp-caption-text">A tiny sample of the traffic after a DNS server was enabled on the newly registered domain fuckbriankrebs dot com. Each unique IP address requested its own unique subdomain. Image: Seralys.</p></div>
  131. <p>For one thing, they said, if the domain was somehow critical to the operation of the botnet, why was it still unregistered and actively for-sale? Why indeed, we asked. Happily, the domain name was deftly snatched up last week by <strong>Philippe Caturegli</strong>, &#8220;chief hacking officer&#8221; for the security intelligence company <a href="https://seralys.com/" target="_blank" rel="noopener">Seralys</a>.</p>
  132. <p>Caturegli enabled a passive DNS server on that domain and within a few hours received more than 700,000 requests for <a href="https://z3zhnw7npvig.fuckbriankrebs.com/" target="_blank" rel="noopener">unique subdomains on fuckbriankrebs[.]com</a>.</p>
  133. <p>But even with that visibility into Aisuru, it is difficult to use this domain check-in feature to measure its true size, Brundage said. After all, he said, the systems that are phoning home to the domain are only a small portion of the overall botnet.</p>
  134. <p>&#8220;The bots are hardcoded to just spam lookups on the subdomains,&#8221; he said. &#8220;So anytime an infection occurs or it runs in the background, it will do one of those DNS queries.&#8221;</p>
  135. <div id="attachment_72463" style="width: 758px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72463" decoding="async" loading="lazy" class=" wp-image-72463" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/cat-fbk.png" alt="" width="748" height="800" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/cat-fbk.png 823w, https://krebsonsecurity.com/wp-content/uploads/2025/10/cat-fbk-768x821.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/cat-fbk-782x836.png 782w" sizes="(max-width: 748px) 100vw, 748px" /><p id="caption-attachment-72463" class="wp-caption-text">Caturegli briefly configured all subdomains on fuckbriankrebs dot com to display this ASCII art image to visiting systems today.</p></div>
  136. <p>The domain fuckbriankrebs[.]com has a storied history. On its initial launch in 2009, it was <a href="https://krebsonsecurity.com/2010/01/tough-talk-from-those-who-hide/" target="_blank" rel="noopener">used to spread malicious software by the </a><a href="https://krebsonsecurity.com/?s=cutwail" target="_blank" rel="noopener">Cutwail</a><a href="https://krebsonsecurity.com/2010/01/tough-talk-from-those-who-hide/" target="_blank" rel="noopener"> spam botnet</a>. In 2011, the domain was involved in a notable DDoS against this website from a botnet powered by <strong>Russkill</strong> (a.k.a. &#8220;Dirt Jumper&#8221;).</p>
  137. <p><strong>Domaintools.com</strong> finds that in 2015, fuckbriankrebs[.]com was registered to an email address attributed to <strong>David &#8220;Abdilo&#8221; Crees</strong>, a 27-year-old Australian man <a href="https://databreaches.net/2025/05/17/australian-national-known-as-dr32-sentenced-in-u-s-federal-court/" target="_blank" rel="noopener">sentenced in May 2025 to time served</a> for cybercrime convictions related to the <a href="https://krebsonsecurity.com/?s=lizard+squad" target="_blank" rel="noopener">Lizard Squad hacking group</a>.</p>
  138. <p><strong>Update, Nov. 1, 2025, 10:25 a.m. ET:</strong> An earlier version of this story erroneously cited Spur&#8217;s proxy numbers from earlier this year; Spur said those numbers conflated residential proxies &#8212; which are rotating and attached to real end-user devices &#8212; with &#8220;ISP proxies&#8221; located at AT&amp;T. ISP proxies, Spur said, involve tricking an ISP into routing a large number of IP addresses that are resold as far more static datacenter proxies.</p>
  139. ]]></content:encoded>
  140. <wfw:commentRss>https://krebsonsecurity.com/2025/10/aisuru-botnet-shifts-from-ddos-to-residential-proxies/feed/</wfw:commentRss>
  141. <slash:comments>40</slash:comments>
  142. </item>
  143. <item>
  144. <title>Canada Fines Cybercrime Friendly Cryptomus $176M</title>
  145. <link>https://krebsonsecurity.com/2025/10/canada-fines-cybercrime-friendly-cryptomus-176m/</link>
  146. <comments>https://krebsonsecurity.com/2025/10/canada-fines-cybercrime-friendly-cryptomus-176m/#comments</comments>
  147. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  148. <pubDate>Wed, 22 Oct 2025 17:21:36 +0000</pubDate>
  149. <category><![CDATA[A Little Sunshine]]></category>
  150. <category><![CDATA[Ne'er-Do-Well News]]></category>
  151. <category><![CDATA[Ransomware]]></category>
  152. <category><![CDATA[Russia's War on Ukraine]]></category>
  153. <category><![CDATA[Web Fraud 2.0]]></category>
  154. <category><![CDATA[Cryptomus]]></category>
  155. <category><![CDATA[CTV National News]]></category>
  156. <category><![CDATA[Financial Transactions and Reports Analysis Center of Canada]]></category>
  157. <category><![CDATA[FINTRAC]]></category>
  158. <category><![CDATA[Investigative Journalism Foundation]]></category>
  159. <category><![CDATA[Richard Sanders]]></category>
  160. <category><![CDATA[Sarah Paquet]]></category>
  161. <category><![CDATA[Xeltox Enterprises Ltd]]></category>
  162. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72407</guid>
  163.  
  164. <description><![CDATA[Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services. The penalties for violating Canada's anti money-laundering laws come ten months after KrebsOnSecurity noted that Cryptomus's Vancouver street address was home to dozens of foreign currency dealers, money transfer businesses, and cryptocurrency exchanges — none of which were physically located there.]]></description>
  165. <content:encoded><![CDATA[<p>Financial regulators in Canada this week levied $176 million in fines against <strong>Cryptomus</strong>, a digital payments platform that supports dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services. The penalties for violating Canada&#8217;s anti money-laundering laws come ten months after KrebsOnSecurity noted that Cryptomus&#8217;s Vancouver street address was home to dozens of foreign currency dealers, money transfer businesses, and cryptocurrency exchanges — none of which were physically located there.</p>
  166. <p><img decoding="async" loading="lazy" class="aligncenter wp-image-69762" src="https://krebsonsecurity.com/wp-content/uploads/2024/12/cryptomusblack.png" alt="" width="745" height="156" /></p>
  167. <p>On October 16, the <strong>Financial Transactions and Reports Analysis Center of Canada</strong> (FINTRAC) imposed a $176,960,190 penalty on <strong>Xeltox Enterprises Ltd.</strong>, more commonly known as the cryptocurrency payments platform <strong>Cryptomus</strong>.</p>
  168. <p>FINTRAC <a href="https://fintrac-canafe.canada.ca/new-neuf/nr/2025-10-22-eng" target="_blank" rel="noopener">found</a> that Cryptomus failed to submit suspicious transaction reports in cases where there were reasonable grounds to suspect that they were related to the laundering of proceeds connected to trafficking in child sexual abuse material, fraud, ransomware payments and sanctions evasion.</p>
  169. <p>&#8220;Given that numerous violations in this case were connected to trafficking in child sexual abuse material, fraud, ransomware payments and sanctions evasion, FINTRAC was compelled to take this unprecedented enforcement action,&#8221; said <strong>Sarah Paquet</strong>, director and CEO at the regulatory agency.</p>
  170. <p>In December 2024, KrebsOnSecurity covered research by blockchain analyst and investigator <strong>Richard Sanders</strong>, who&#8217;d spent several months signing up for various cybercrime services, and then tracking where their customer funds go from there. The <a href="https://krebsonsecurity.com/2024/12/how-cryptocurrency-turns-to-cash-in-russian-banks/" target="_blank" rel="noopener">122 services targeted in Sanders&#8217;s research</a> all used Cryptomus, and included some of the more prominent businesses advertising on the cybercrime forums, such as:</p>
  171. <p>-abuse-friendly or “bulletproof” hosting providers like anonvm[.]wtf, and <a href="https://krebsonsecurity.com/tag/pq-hosting/" target="_blank" rel="noopener">PQHosting</a>;<br />
  172. -sites selling aged email, financial, or social media accounts, such as verif[.]work and kopeechka[.]store;<br />
  173. -anonymity or “proxy” providers like crazyrdp[.]com and rdp[.]monster;<br />
  174. -anonymous SMS services, including anonsim[.]net and smsboss[.]pro.</p>
  175. <div id="attachment_69745" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-69745" decoding="async" loading="lazy" class=" wp-image-69745" src="https://krebsonsecurity.com/wp-content/uploads/2024/12/flymoney.png" alt="" width="749" height="429" srcset="https://krebsonsecurity.com/wp-content/uploads/2024/12/flymoney.png 1399w, https://krebsonsecurity.com/wp-content/uploads/2024/12/flymoney-768x440.png 768w, https://krebsonsecurity.com/wp-content/uploads/2024/12/flymoney-782x448.png 782w" sizes="(max-width: 749px) 100vw, 749px" /><p id="caption-attachment-69745" class="wp-caption-text">Flymoney, one of dozens of cryptocurrency exchanges apparently nested at Cryptomus. The image from this website has been machine translated from Russian.</p></div>
  176. <p>Sanders found at least 56 cryptocurrency exchanges were using Cryptomus to process transactions, including financial entities with names like casher[.]su, grumbot[.]com, flymoney[.]biz, obama[.]ru and swop[.]is.</p>
  177. <p>&#8220;These platforms were built for Russian speakers, and they each advertised the ability to anonymously swap one form of cryptocurrency for another,&#8221; the December 2024 story noted. &#8220;They also allowed the exchange of cryptocurrency for cash in accounts at some of Russia’s largest banks — nearly all of which are currently sanctioned by the United States and other western nations.&#8221;</p>
  178. <p>Reached for comment on FINTRAC&#8217;s action, Sanders told KrebsOnSecurity he was surprised it took them so long.</p>
  179. <p>&#8220;I have no idea why they don&#8217;t just sanction them or prosecute them,&#8221; Sanders said. &#8220;I&#8217;m not let down with the fine amount but it&#8217;s also just going to be the cost of doing business to them.&#8221;<span id="more-72407"></span></p>
  180. <p>The $173 million fine is a significant sum for FINTRAC, which imposed 23 such penalties last year totaling less than $26 million. But Sanders says FINTRAC still has much work to do in pursuing other shadowy money service businesses (MSBs) that are registered in Canada but are likely money laundering fronts for entities based in Russia and Iran.</p>
  181. <p><img decoding="async" loading="lazy" class="aligncenter wp-image-69766" src="https://krebsonsecurity.com/wp-content/uploads/2024/12/happycanada.png" alt="" width="750" height="458" /></p>
  182. <p>In an investigation published in July 2024, <strong>CTV National News </strong>and the <strong>Investigative Journalism Foundation (IJF)</strong> <a href="https://theijf.org/msb-cluster-investigation" target="_blank" rel="noopener">documented dozens of cases</a> across Canada where multiple MSBs are incorporated at the same address, often without the knowledge or consent of the location’s actual occupant.</p>
  183. <p>Their inquiry found that the street address for Cryptomus parent Xeltox Enterprises was listed as the home of at least 76 foreign currency dealers, eight MSBs, and six cryptocurrency exchanges. At that address is a three-story building that used to be a bank and now houses a massage therapy clinic and a co-working space. But the news outlets found none of the MSBs or currency dealers were paying for services at that co-working space.</p>
  184. <p>The reporters also found another collection of 97 MSBs clustered at an address for a commercial office suite in Ontario, even though there was no evidence any of these companies had ever arranged for any business services at that address.</p>
  185. ]]></content:encoded>
  186. <wfw:commentRss>https://krebsonsecurity.com/2025/10/canada-fines-cybercrime-friendly-cryptomus-176m/feed/</wfw:commentRss>
  187. <slash:comments>47</slash:comments>
  188. </item>
  189. <item>
  190. <title>Email Bombs Exploit Lax Authentication in Zendesk</title>
  191. <link>https://krebsonsecurity.com/2025/10/email-bombs-exploit-lax-authentication-in-zendesk/</link>
  192. <comments>https://krebsonsecurity.com/2025/10/email-bombs-exploit-lax-authentication-in-zendesk/#comments</comments>
  193. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  194. <pubDate>Fri, 17 Oct 2025 11:26:27 +0000</pubDate>
  195. <category><![CDATA[A Little Sunshine]]></category>
  196. <category><![CDATA[Latest Warnings]]></category>
  197. <category><![CDATA[The Coming Storm]]></category>
  198. <category><![CDATA[Web Fraud 2.0]]></category>
  199. <category><![CDATA[CapCom]]></category>
  200. <category><![CDATA[Carolyn Camoens]]></category>
  201. <category><![CDATA[CompTIA]]></category>
  202. <category><![CDATA[Discord]]></category>
  203. <category><![CDATA[GMAC]]></category>
  204. <category><![CDATA[NordVPN]]></category>
  205. <category><![CDATA[The Washington Post]]></category>
  206. <category><![CDATA[Tinder]]></category>
  207. <category><![CDATA[Zendesk]]></category>
  208. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72392</guid>
  209.  
  210. <description><![CDATA[Cybercriminals are abusing a widespread lack of authentication in the customer service platform Zendesk to flood targeted email inboxes with menacing messages that come from hundreds of Zendesk corporate customers simultaneously.]]></description>
  211. <content:encoded><![CDATA[<p>Cybercriminals are abusing a widespread lack of authentication in the customer service platform <strong>Zendesk</strong> to flood targeted email inboxes with menacing messages that come from hundreds of Zendesk corporate customers simultaneously.</p>
  212. <p>Zendesk is an automated help desk service designed to make it simple for people to contact companies for customer support issues. Earlier this week, KrebsOnSecurity started receiving thousands of ticket creation notification messages through Zendesk in rapid succession, each bearing the name of different Zendesk customers, such as <strong>CapCom</strong>, <strong>CompTIA</strong>, <strong>Discord</strong>, <strong>GMAC</strong>, <strong>NordVPN</strong>, <strong>The Washington Post</strong>, and<strong> Tinder</strong>.</p>
  213. <p>The abusive missives sent via Zendesk&#8217;s platform can include any subject line chosen by the abusers. In my case, the messages variously warned about a supposed law enforcement investigation involving KrebsOnSecurity.com, or else contained personal insults.</p>
  214. <p>Moreover, the automated messages that are sent out from this type of abuse all come from customer domain names &#8212; not from Zendesk. In the example below, replying to any of the junk customer support responses from The Washington Post&#8217;s Zendesk installation shows the reply-to address is help@washpost.com.</p>
  215. <div id="attachment_72398" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72398" decoding="async" loading="lazy" class=" wp-image-72398" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/zendeskwapo.png" alt="" width="749" height="362" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/zendeskwapo.png 2110w, https://krebsonsecurity.com/wp-content/uploads/2025/10/zendeskwapo-768x371.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/zendeskwapo-1536x743.png 1536w, https://krebsonsecurity.com/wp-content/uploads/2025/10/zendeskwapo-2048x990.png 2048w, https://krebsonsecurity.com/wp-content/uploads/2025/10/zendeskwapo-782x378.png 782w" sizes="(max-width: 749px) 100vw, 749px" /><p id="caption-attachment-72398" class="wp-caption-text">One of dozens of messages sent to me this week by The Washington Post.</p></div>
  216. <p>Notified about the mass abuse of their platform, Zendesk said the emails were ticket creation notifications from customer accounts that configured their Zendesk instance to allow anyone to submit support requests &#8212; including anonymous users.</p>
  217. <p>&#8220;These types of support tickets can be part of a customer’s workflow, where a prior verification is not required to allow them to engage and make use of the Support capabilities,&#8221; said <strong>Carolyn Camoens</strong>, communications director at Zendesk. &#8220;Although we recommend our customers to permit only verified users to submit tickets, some Zendesk customers prefer to use an anonymous environment to allow for tickets to be created due to various business reasons.&#8221;</p>
  218. <p>Camoens said requests that can be submitted in an anonymous manner can also make use of an email address of the submitter&#8217;s choice.</p>
  219. <p>&#8220;However, this method can also be used for spam requests to be created on behalf of third party email addresses,&#8221; Camoens said. &#8220;If an account has enabled the auto-responder trigger based on ticket creation, then this allows for the ticket notification email to be sent from our customer’s accounts to these third parties. The notification will also include the Subject added by the creator of these tickets.&#8221;</p>
  220. <p>Zendesk claims it uses rate limits to prevent a high volume of requests from being created at once, but those limits did not stop Zendesk customers from flooding my inbox with thousands of messages in just a few hours.</p>
  221. <p>&#8220;We recognize that our systems were leveraged against you in a distributed, many-against-one manner,&#8221; Camoens said. &#8220;We are actively investigating additional preventive measures. We are also advising customers experiencing this type of activity to follow our general security best practices and configure an authenticated ticket creation workflow.&#8221;</p>
  222. <p>In all of the cases above, the messaging abuse would not have been possible if Zendesk customers validated support request email addresses prior to sending responses. Failing to do so may make it easier for Zendesk clients to handle customer support requests, but it also allows ne&#8217;er-do-wells to sully the sender&#8217;s brand in service of disruptive and malicious email floods.</p>
  223. ]]></content:encoded>
  224. <wfw:commentRss>https://krebsonsecurity.com/2025/10/email-bombs-exploit-lax-authentication-in-zendesk/feed/</wfw:commentRss>
  225. <slash:comments>49</slash:comments>
  226. </item>
  227. <item>
  228. <title>Patch Tuesday, October 2025 &#8216;End of 10&#8217; Edition</title>
  229. <link>https://krebsonsecurity.com/2025/10/patch-tuesday-october-2025-end-of-10-edition/</link>
  230. <comments>https://krebsonsecurity.com/2025/10/patch-tuesday-october-2025-end-of-10-edition/#comments</comments>
  231. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  232. <pubDate>Tue, 14 Oct 2025 22:57:38 +0000</pubDate>
  233. <category><![CDATA[Time to Patch]]></category>
  234. <category><![CDATA[CVE-2025-24990]]></category>
  235. <category><![CDATA[CVE-2025-59227]]></category>
  236. <category><![CDATA[CVE-2025-59230]]></category>
  237. <category><![CDATA[CVE-2025-59234]]></category>
  238. <category><![CDATA[CVE-2025-59287]]></category>
  239. <category><![CDATA[Immersive]]></category>
  240. <category><![CDATA[Kev Breen]]></category>
  241. <category><![CDATA[Microsoft Office]]></category>
  242. <category><![CDATA[Microsoft Patch Tuesday October 2025]]></category>
  243. <category><![CDATA[Satnam Narang]]></category>
  244. <category><![CDATA[Tenable]]></category>
  245. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72318</guid>
  246.  
  247. <description><![CDATA[Microsoft today released software updates to plug a whopping 172 security holes in its Windows operating systems, including at least three vulnerabilities that are already being actively exploited. October's Patch Tuesday also marks the final month that Microsoft will ship security updates for Windows 10 systems. If you're running a Windows 10 PC and you're unable or unwilling to migrate to Windows 11, read on for other options.]]></description>
  248. <content:encoded><![CDATA[<p><strong>Microsoft</strong> today released software updates to plug a whopping 172 security holes in its <strong>Windows</strong> operating systems, including at least two vulnerabilities that are already being actively exploited. October&#8217;s Patch Tuesday also marks the final month that Microsoft will ship security updates for <strong>Windows 10</strong> systems. If you&#8217;re running a Windows 10 PC and you&#8217;re unable or unwilling to migrate to<strong> Windows 11</strong>, read on for other options.</p>
  249. <p><img decoding="async" loading="lazy" class="aligncenter wp-image-52647" src="https://krebsonsecurity.com/wp-content/uploads/2020/08/windowsec.png" alt="" width="748" height="549" /></p>
  250. <p>The first zero-day bug addressed this month (<a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24990" target="_blank" rel="noopener">CVE-2025-24990</a>) involves a third-party modem driver called Agere Modem that&#8217;s been bundled with Windows for the past two decades. Microsoft responded to active attacks on this flaw by completely removing the vulnerable driver from Windows.</p>
  251. <p>The other zero-day is <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59230" target="_blank" rel="noopener">CVE-2025-59230</a>, an elevation of privilege vulnerability in <strong>Windows Remote Access Connection Manager</strong> (also known as <strong>RasMan</strong>), a service used to manage remote network connections through virtual private networks (VPNs) and dial-up networks.</p>
  252. <p>&#8220;While RasMan is a frequent flyer on Patch Tuesday, appearing more than 20 times since January 2022, this is the first time we&#8217;ve seen it exploited in the wild as a zero day,&#8221; said <strong>Satnam Narang</strong>, senior staff research engineer at <strong>Tenable</strong>.</p>
  253. <p>Narang notes that <strong>Microsoft Office</strong> users should also take note of <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59227" target="_blank" rel="noopener">CVE-2025-59227</a> and <a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59234" target="_blank" rel="noopener">CVE-2025-59234</a>, a pair of remote code execution bugs that take advantage of &#8220;Preview Pane,” meaning that the target doesn’t even need to open the file for exploitation to occur. To execute these flaws, an attacker would social engineer a target into previewing an email with a malicious Microsoft Office document.</p>
  254. <p>Speaking of Office, Microsoft <a href="https://www.windowscentral.com/microsoft/microsoft-office/microsoft-is-making-word-automatically-save-new-documents-to-onedrive-by-default" target="_blank" rel="noopener">quietly announced this week</a> that <strong>Microsoft Word</strong> will now automatically save documents to OneDrive, Microsoft&#8217;s cloud platform. Users who are uncomfortable saving all of their documents to Microsoft&#8217;s cloud can change this in Word&#8217;s settings; ZDNet has <a href="https://www.zdnet.com/article/microsoft-word-forcing-you-to-save-new-files-to-the-cloud-heres-how-to-stop-it/" target="_blank" rel="noopener">a useful how-to</a> on disabling this feature.</p>
  255. <p><strong>Kev Breen</strong>, senior director of threat research at <strong>Immersive</strong>, called attention to <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287" target="_blank" rel="noopener">CVE-2025-59287</a>, a critical remote code execution bug in the Windows Server Update Service  (WSUS) &#8212; the very same Windows service responsible for downloading security patches for Windows Server versions. Microsoft says there are no signs this weakness is being exploited yet. But with a threat score of 9.8 out of possible 10 and marked &#8220;exploitation more likely,&#8221; CVE-2025-59287 can be exploited without authentication and is an easy &#8220;patch now&#8221; candidate.</p>
  256. <p>&#8220;Microsoft provides limited information, stating that an unauthenticated attacker with network access can send untrusted data to the WSUS server, resulting in deserialization and code execution,&#8221; Breen wrote. &#8220;As WSUS is a trusted Windows service that is designed to update privileged files across the file system, an attacker would have free rein over the operating system and could potentially bypass some EDR detections that ignore or exclude the WSUS service.&#8221;</p>
  257. <p>For more on other fixes from Redmond today, check out the <strong>SANS Internet Storm Center</strong> <a href="https://isc.sans.edu/forums/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368/" target="_blank" rel="noopener">monthly roundup</a>, which indexes all of the updates by severity and urgency.</p>
  258. <p>Windows 10 isn&#8217;t the only Microsoft OS that is reaching end-of-life today; <strong>Exchange Server 2016</strong>, <strong>Exchange Server 2019</strong>, <strong>Skype for Business 2016</strong>, <strong>Windows 11 IoT Enterprise Version 22H2</strong>, and <strong>Outlook 2016</strong> are some of the other products that Microsoft is sunsetting today.</p>
  259. <p><img decoding="async" loading="lazy" class="aligncenter wp-image-72385" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/win10pcrequirements.png" alt="" width="747" height="474" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/win10pcrequirements.png 2050w, https://krebsonsecurity.com/wp-content/uploads/2025/10/win10pcrequirements-768x487.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/win10pcrequirements-1536x974.png 1536w, https://krebsonsecurity.com/wp-content/uploads/2025/10/win10pcrequirements-2048x1299.png 2048w, https://krebsonsecurity.com/wp-content/uploads/2025/10/win10pcrequirements-782x496.png 782w" sizes="(max-width: 747px) 100vw, 747px" /></p>
  260. <p>If you&#8217;re running any Windows 10 systems, you&#8217;ve probably already determined whether your PC meets the technical hardware specs recommended for the Windows 11 OS. If you&#8217;re reluctant or unable to migrate a Windows 10 system to Windows 11, there are alternatives to simply continuing to use Windows 10 without ongoing security updates.<span id="more-72318"></span></p>
  261. <p>One option is to pay for another year&#8217;s worth of security updates through <a href="https://www.microsoft.com/en-ie/windows/extended-security-updates?r=1" target="_blank" rel="noopener">Microsoft&#8217;s Extended Security Updates</a> (ESU) program. The cost is just $30 if you don&#8217;t have a Microsoft account, and apparently free if you register the PC to a Microsoft account. This <a href="https://www.youtube.com/watch?v=SZH7MlvOoPM" target="_blank" rel="noopener">video breakdown</a> from <strong>Ask Your Computer Guy</strong> does a good job of walking Windows 10 users through this process. Microsoft emphasizes that ESU enrollment does not provide other types of fixes, feature improvements or product enhancements. It also does not come with technical support.</p>
  262. <div id="attachment_72386" style="width: 756px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72386" decoding="async" loading="lazy" class=" wp-image-72386" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/esu-winupdate.png" alt="" width="746" height="436" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/esu-winupdate.png 2226w, https://krebsonsecurity.com/wp-content/uploads/2025/10/esu-winupdate-768x449.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/esu-winupdate-1536x897.png 1536w, https://krebsonsecurity.com/wp-content/uploads/2025/10/esu-winupdate-2048x1196.png 2048w, https://krebsonsecurity.com/wp-content/uploads/2025/10/esu-winupdate-782x457.png 782w" sizes="(max-width: 746px) 100vw, 746px" /><p id="caption-attachment-72386" class="wp-caption-text">If your Windows 10 system is associated with a Microsoft account and signed in when you visit Windows Update, you should see an option to enroll in extended updates. Image: https://www.youtube.com/watch?v=SZH7MlvOoPM</p></div>
  263. <p>Windows 10 users also have the option of installing some flavor of Linux instead. Anyone seriously considering this option should check out the website <a href="https://endof10.org/" target="_blank" rel="noopener">endof10.org</a>, which includes a plethora of tips and a DIY installation guide.</p>
  264. <p><strong>Linux Mint </strong>is a great option for Linux newbies. Like most modern Linux versions, Mint will run on anything with a 64-bit CPU that has at least 2GB of memory, although 4GB is recommended. In other words, it will run on almost any computer produced in the last decade.</p>
  265. <p>Linux Mint also is likely to be the most intuitive interface for regular Windows users, and it is largely configurable without any fuss at the text-only command-line prompt. Mint and other flavors of Linux come with <strong>LibreOffice</strong>, which is an open source suite of tools that includes applications similar to Microsoft Office, and it can open, edit and save documents as Microsoft Office files.</p>
  266. <p>If you’d prefer to give Linux a test drive before installing it on a Windows PC, you can always just download it to a removable USB drive. From there, reboot the computer (with the removable drive plugged in) and select the option at startup to run the operating system from the external USB drive. If you don’t see an option for that after restarting, try restarting again and hitting the F8 button, which should open a list of bootable drives. <a href="https://www.youtube.com/watch?v=_qZI6i21jB4" target="_blank" rel="noopener">Here’s a fairly thorough tutorial</a> that walks through exactly how to do all this.</p>
  267. <p>And if this is your first time trying out Linux, relax and have fun: The nice thing about a “live” version of Linux (as it’s called when the operating system is run from a removable drive such as a CD or a USB stick) is that none of your changes persist after a reboot. Even if you somehow manage to break something, a restart will return the system back to its original state.</p>
  268. <p>As ever, if you experience any difficulties during or after applying this month&#8217;s batch of patches, please leave a note about it in the comments below.</p>
  269. ]]></content:encoded>
  270. <wfw:commentRss>https://krebsonsecurity.com/2025/10/patch-tuesday-october-2025-end-of-10-edition/feed/</wfw:commentRss>
  271. <slash:comments>63</slash:comments>
  272. </item>
  273. <item>
  274. <title>DDoS Botnet Aisuru Blankets US ISPs in Record DDoS</title>
  275. <link>https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/</link>
  276. <comments>https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/#comments</comments>
  277. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  278. <pubDate>Fri, 10 Oct 2025 16:10:43 +0000</pubDate>
  279. <category><![CDATA[DDoS-for-Hire]]></category>
  280. <category><![CDATA[Internet of Things (IoT)]]></category>
  281. <category><![CDATA[Latest Warnings]]></category>
  282. <category><![CDATA[The Coming Storm]]></category>
  283. <category><![CDATA[Web Fraud 2.0]]></category>
  284. <category><![CDATA[9gigsofram]]></category>
  285. <category><![CDATA[Aisuru]]></category>
  286. <category><![CDATA[AT&T]]></category>
  287. <category><![CDATA[Botshield]]></category>
  288. <category><![CDATA[Charter Communications]]></category>
  289. <category><![CDATA[Comcast]]></category>
  290. <category><![CDATA[Cosmic]]></category>
  291. <category><![CDATA[DDoS]]></category>
  292. <category><![CDATA[ddos-for-hire]]></category>
  293. <category><![CDATA[Erik Buckingham]]></category>
  294. <category><![CDATA[Forky]]></category>
  295. <category><![CDATA[Global Secure Layer]]></category>
  296. <category><![CDATA[Minecraft]]></category>
  297. <category><![CDATA[mirai]]></category>
  298. <category><![CDATA[NETSCOUT]]></category>
  299. <category><![CDATA[OVH]]></category>
  300. <category><![CDATA[Project Shield]]></category>
  301. <category><![CDATA[ProxyPipe]]></category>
  302. <category><![CDATA[Rapper Bot]]></category>
  303. <category><![CDATA[Robert Coelho]]></category>
  304. <category><![CDATA[roland dobbins]]></category>
  305. <category><![CDATA[Steven Ferguson]]></category>
  306. <category><![CDATA[T-Mobile]]></category>
  307. <category><![CDATA[TCPShield]]></category>
  308. <category><![CDATA[Totolink]]></category>
  309. <category><![CDATA[U.S. Department of Justice]]></category>
  310. <category><![CDATA[Verizon]]></category>
  311. <category><![CDATA[XLab]]></category>
  312. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72321</guid>
  313.  
  314. <description><![CDATA[The world's largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet providers like AT&#038;T, Comcast and Verizon, new evidence suggests. Experts say the heavy concentration of infected devices at U.S. providers is complicating efforts to limit collateral damage from the botnet's attacks, which shattered previous records this week with a brief traffic flood that clocked in at nearly 30 trillion bits of data per second.]]></description>
  315. <content:encoded><![CDATA[<p>The world&#8217;s largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet providers like <strong>AT&amp;T</strong>, <strong>Comcast</strong> and <strong>Verizon</strong>, new evidence suggests. Experts say the heavy concentration of infected devices at U.S. providers is complicating efforts to limit collateral damage from the botnet&#8217;s attacks, which shattered previous records this week with a brief traffic flood that clocked in at nearly 30 trillion bits of data per second.</p>
  316. <p>Since its debut more than a year ago, the Aisuru botnet has steadily outcompeted virtually all other IoT-based botnets in the wild, with recent attacks siphoning Internet bandwidth from an estimated 300,000 compromised hosts worldwide.</p>
  317. <p>The hacked systems that get subsumed into the botnet are mostly consumer-grade routers, security cameras, digital video recorders and other devices operating with insecure and outdated firmware, and/or factory-default settings. Aisuru&#8217;s owners are continuously scanning the Internet for these vulnerable devices and enslaving them for use in distributed denial-of-service (DDoS) attacks that can overwhelm targeted servers with crippling amounts of junk traffic.</p>
  318. <p>As Aisuru&#8217;s size has mushroomed, so has its punch. In May 2025, KrebsOnSecurity was <a href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" target="_blank" rel="noopener">hit with a near-record 6.35 terabits per second (Tbps) attack from Aisuru,</a> which was then the largest assault that Google&#8217;s DDoS protection service <strong>Project Shield</strong> had ever mitigated. Days later, Aisuru shattered that record with a data blast in excess of 11 Tbps.</p>
  319. <p>By late September, Aisuru was publicly flexing DDoS capabilities topping 22 Tbps. Then on October 6, its operators heaved a whopping 29.6 terabits of junk data packets each second at a targeted host. Hardly anyone noticed because it appears to have been a brief test or demonstration of Aisuru&#8217;s capabilities: The traffic flood lasted less only a few seconds and was pointed at an Internet server that was specifically designed to measure large-scale DDoS attacks.</p>
  320. <div id="attachment_72353" style="width: 753px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72353" decoding="async" loading="lazy" class=" wp-image-72353" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/29-69t.png" alt="" width="743" height="93" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/29-69t.png 841w, https://krebsonsecurity.com/wp-content/uploads/2025/10/29-69t-768x96.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/29-69t-782x98.png 782w" sizes="(max-width: 743px) 100vw, 743px" /><p id="caption-attachment-72353" class="wp-caption-text">A measurement of an Oct. 6 DDoS believed to have been launched through multiple botnets operated by the owners of the Aisuru botnet. Image: DDoS Analyzer Community on Telegram.</p></div>
  321. <p>Aisuru&#8217;s overlords aren&#8217;t just showing off. Their botnet is being blamed for a series of increasingly massive and disruptive attacks. Although recent assaults from Aisuru have targeted mostly ISPs that serve online gaming communities like <strong>Minecraft</strong>, those digital sieges often result in widespread collateral Internet disruption.</p>
  322. <p>For the past several weeks, ISPs hosting some of the Internet&#8217;s top gaming destinations have been hit with a relentless volley of gargantuan attacks that experts say are well beyond the DDoS mitigation capabilities of most organizations connected to the Internet today.</p>
  323. <p><strong>Steven Ferguson</strong> is principal security engineer at <strong>Global Secure Layer</strong> (GSL), an ISP in Brisbane, Australia. GSL hosts <strong>TCPShield</strong>, which offers free or low-cost DDoS protection to more than 50,000 Minecraft servers worldwide. Ferguson told KrebsOnSecurity that on October 8, TCPShield was walloped with a blitz from Aisuru that flooded its network with more than 15 terabits of junk data per second.</p>
  324. <p>Ferguson said that after the attack subsided, TCPShield was told by its upstream provider <strong>OVH</strong> that they were no longer welcome as a customer.</p>
  325. <p>&#8220;This was causing serious congestion on their Miami external ports for several weeks, shown publicly via their weather map,&#8221; he said, explaining that TCPShield is now solely protected by GSL.</p>
  326. <p>Traces from the recent spate of crippling Aisuru <a href="https://www.youtube.com/watch?v=OAzk1K4sn7k" target="_blank" rel="noopener">attacks on gaming servers</a> can be still seen at the website <a href="https://grafana.blockgametracker.gg/d/nlKArnQ4k/global-playercount-by-as?orgId=1&amp;viewPanel=3&amp;from=1759040061640&amp;to=1759161701743" target="_blank" rel="noopener">blockgametracker.gg</a>, which indexes the uptime and downtime of the top Minecraft hosts. In the following example from a series of data deluges on the evening of September 28, we can see an Aisuru botnet campaign briefly knocked TCPShield offline.</p>
  327. <div id="attachment_72328" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72328" decoding="async" loading="lazy" class=" wp-image-72328" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/tcpshield-aisuru.png" alt="" width="750" height="457" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/tcpshield-aisuru.png 1436w, https://krebsonsecurity.com/wp-content/uploads/2025/10/tcpshield-aisuru-768x468.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/tcpshield-aisuru-782x476.png 782w" sizes="(max-width: 750px) 100vw, 750px" /><p id="caption-attachment-72328" class="wp-caption-text">An Aisuru botnet attack on TCPShield (AS64199) on Sept. 28  can be seen in the giant downward spike in the middle of this uptime graphic. Image: grafana.blockgametracker.gg.</p></div>
  328. <p>Paging through the same uptime graphs for other network operators listed shows almost all of them suffered brief but repeated outages around the same time. Here is the same uptime tracking for Minecraft servers on the network provider <strong>Cosmic</strong> (AS30456), and it shows multiple large dips that correspond to game server outages caused by Aisuru.</p>
  329. <div id="attachment_72333" style="width: 757px" class="wp-caption aligncenter"><a href="https://krebsonsecurity.com/wp-content/uploads/2025/10/cosmic-aisuru.png" target="_blank" rel="noopener"><img aria-describedby="caption-attachment-72333" decoding="async" loading="lazy" class="wp-image-72333" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/cosmic-aisuru.png" alt="" width="747" height="463" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/cosmic-aisuru.png 1343w, https://krebsonsecurity.com/wp-content/uploads/2025/10/cosmic-aisuru-768x476.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/cosmic-aisuru-782x484.png 782w" sizes="(max-width: 747px) 100vw, 747px" /></a><p id="caption-attachment-72333" class="wp-caption-text">Multiple DDoS attacks from Aisuru can be seen against the Minecraft host Cosmic on Sept. 28. The sharp downward spikes correspond to brief but enormous attacks from Aisuru. Image: grafana.blockgametracker.gg.</p></div>
  330. <h2>BOTNETS R US</h2>
  331. <p>Ferguson said he&#8217;s been tracking Aisuru for about three months, and recently he noticed the botnet&#8217;s composition shifted heavily toward infected systems at ISPs in the United States. Ferguson shared logs from an attack on October 8 that indexed traffic by the total volume sent through each network provider, and the logs showed that 11 of the top 20 traffic sources were U.S. based ISPs.</p>
  332. <p><strong>AT&amp;T</strong> customers were by far the biggest U.S. contributors to that attack, followed by botted systems on <strong>Charter Communications</strong>, <strong>Comcast</strong>, <strong>T-Mobile</strong> and <strong>Verizon</strong>, Ferguson found. He said the volume of data packets per second coming from infected IoT hosts on these ISPs is often so high that it has started to affect the quality of service that ISPs are able to provide to adjacent (non-botted) customers.</p>
  333. <p>&#8220;The impact extends beyond victim networks,&#8221; Ferguson said. &#8220;For instance we have seen 500 gigabits of traffic via Comcast&#8217;s network alone. This amount of egress leaving their network, especially being so US-East concentrated, will result in congestion towards other services or content trying to be reached while an attack is ongoing.&#8221;</p>
  334. <p><strong>Roland Dobbins</strong> is principal engineer at <strong>Netscout</strong>. Dobbins said Ferguson is spot on, noting that while most ISPs have effective mitigations in place to handle large incoming DDoS attacks, many are far less prepared to manage the inevitable service degradation caused by large numbers of their customers suddenly using some or all available bandwidth to attack others.</p>
  335. <p><span class="pullquote pqright">&#8220;The outbound and cross-bound DDoS attacks can be just as disruptive as the inbound stuff,&#8221; Dobbin said.</span> &#8220;We&#8217;re now in a situation where ISPs are routinely seeing terabit-per-second plus outbound attacks from their networks that can cause operational problems.&#8221;</p>
  336. <p>&#8220;The crying need for effective and universal outbound DDoS attack suppression is something that is really being highlighted by these recent attacks,&#8221; Dobbins continued. &#8220;A lot of network operators are learning that lesson now, and there&#8217;s going to be a period ahead where there&#8217;s some scrambling and potential disruption going on.&#8221;</p>
  337. <p>KrebsOnSecurity sought comment from the ISPs named in Ferguson&#8217;s report. Charter Communications pointed to <a href="https://policy.charter.com/protecting-our-networks" target="_blank" rel="noopener">a recent blog post on protecting its network</a>, stating that Charter actively monitors for both inbound and outbound attacks, and that it takes proactive action wherever possible.</p>
  338. <p>&#8220;In addition to our own extensive network security, we also aim to reduce the risk of customer connected devices contributing to attacks through our Advanced WiFi solution that includes Security Shield, and we make Security Suite available to our Internet customers,&#8221; Charter wrote in an emailed response to questions. &#8220;With the ever-growing number of devices connecting to networks, we encourage customers to purchase trusted devices with secure development and manufacturing practices, use anti-virus and security tools on their connected devices, and regularly download security patches.&#8221;</p>
  339. <p>A spokesperson for Comcast responded, &#8220;Currently our network is not experiencing impacts and we are able to handle the traffic.&#8221;<span id="more-72321"></span></p>
  340. <h2>9 YEARS OF MIRAI</h2>
  341. <p>Aisuru is built on the bones of malicious code that was <a href="https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/" target="_blank" rel="noopener">leaked in 2016</a> by <a href="https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/" target="_blank" rel="noopener">the original creators of the <strong>Mirai</strong> IoT botnet</a>. Like Aisuru, Mirai quickly outcompeted all other DDoS botnets in its heyday, and obliterated previous DDoS attack records with a 620 gigabit-per-second siege that <a href="https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/" target="_blank" rel="noopener">sidelined this website for nearly four days in 2016</a>.</p>
  342. <p>The Mirai botmasters likewise used their crime machine to attack mostly Minecraft servers, but with the goal of forcing Minecraft server owners to purchase a DDoS protection service that they controlled. In addition, they rented out slices of the Mirai botnet to paying customers, some of whom used it to mask the sources of other types of cybercrime, such as click fraud.</p>
  343. <div id="attachment_36755" style="width: 743px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-36755" decoding="async" loading="lazy" class=" wp-image-36755" src="https://krebsonsecurity.com/wp-content/uploads/2016/10/l3outage-580x330.png" alt="" width="733" height="417" srcset="https://krebsonsecurity.com/wp-content/uploads/2016/10/l3outage-580x330.png 580w, https://krebsonsecurity.com/wp-content/uploads/2016/10/l3outage-768x437.png 768w, https://krebsonsecurity.com/wp-content/uploads/2016/10/l3outage.png 778w" sizes="(max-width: 733px) 100vw, 733px" /><p id="caption-attachment-36755" class="wp-caption-text">A depiction of the outages caused by the Mirai botnet attacks against the internet infrastructure firm Dyn on October 21, 2016. Source: Downdetector.com.</p></div>
  344. <p>Dobbins said Aisuru&#8217;s owners also appear to be renting out their botnet as a distributed proxy network that cybercriminal customers anywhere in the world can use to anonymize their malicious traffic and make it appear to be coming from regular residential users in the U.S.</p>
  345. <p>&#8220;The people who operate this botnet are also selling (it as) residential proxies,&#8221; he said. &#8220;And that&#8217;s being used to reflect application layer attacks through the proxies on the bots as well.&#8221;</p>
  346. <p>The Aisuru botnet harkens back to its predecessor Mirai in another intriguing way. One of its owners is using the Telegram handle &#8220;<strong>9gigsofram</strong>,&#8221; which corresponds to the nickname used by the co-owner of a Minecraft server protection service called <strong>Proxypipe</strong> that was <a href="https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/" target="_blank" rel="noopener">heavily targeted in 2016 by the original Mirai botmasters</a>.</p>
  347. <p><strong>Robert Coelho</strong> co-ran Proxypipe back then along with his business partner <strong>Erik &#8220;9gigsofram&#8221; Buckingham</strong>, and has spent the past nine years fine-tuning various DDoS mitigation companies that cater to Minecraft server operators and other gaming enthusiasts. Coelho said he has no idea why one of Aisuru&#8217;s botmasters chose Buckingham&#8217;s nickname, but added that it might say something about how long this person has been involved in the DDoS-for-hire industry.</p>
  348. <p>&#8220;The Aisuru attacks on the gaming networks these past seven day have been absolutely huge, and you can see tons of providers going down multiple times a day,&#8221; Coelho said.</p>
  349. <p>Coelho said the 15 Tbps attack this week against TCPShield was likely only a portion of the total attack volume hurled by Aisuru at the time, because much of it would have been shoved through networks that simply couldn&#8217;t process that volume of traffic all at once. Such outsized attacks, he said, are becoming increasingly difficult and expensive to mitigate.</p>
  350. <p>&#8220;It&#8217;s definitely at the point now where you need to be spending at least a million dollars a month just to have the network capacity to be able to deal with these attacks,&#8221; he said.</p>
  351. <h2>RAPID SPREAD</h2>
  352. <p>Aisuru has long been rumored to use multiple zero-day vulnerabilities in IoT devices to aid its rapid growth over the past year. <strong>XLab</strong>, the Chinese security company that was the <a href="https://blog.xlab.qianxin.com/large-scale-botnet-airashi-en/" target="_blank" rel="noopener">first to profile Aisuru&#8217;s rise in 2024</a>, warned last month that one of the Aisuru botmasters had compromised the firmware distribution website for <strong>Totolink</strong>, a maker of low-cost routers and other networking gear.</p>
  353. <p>&#8220;Multiple sources indicate the group allegedly compromised a router firmware update server in April and distributed malicious scripts to expand the botnet,&#8221; XLab <a href="https://blog.xlab.qianxin.com/super-large-scale-botnet-aisuru-en/" target="_blank" rel="noopener">wrote</a> on September 15. &#8220;The node count is currently reported to be around 300,000.&#8221;</p>
  354. <div id="attachment_72354" style="width: 716px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72354" decoding="async" loading="lazy" class="size-full wp-image-72354" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/xlab-totoscript.png" alt="" width="706" height="190" /><p id="caption-attachment-72354" class="wp-caption-text">A malicious script implanted into a Totolink update server in April 2025. Image: XLab.</p></div>
  355. <p>Aisuru&#8217;s operators received an unexpected boost to their crime machine in August when the <strong>U.S. Department Justice</strong> <a href="https://krebsonsecurity.com/2025/08/oregon-man-charged-in-rapper-bot-ddos-service/" target="_blank" rel="noopener">charged the alleged proprietor of <strong>Rapper Bot</strong></a>, a DDoS-for-hire botnet that competed directly with Aisuru for control over the global pool of vulnerable IoT systems.</p>
  356. <p>Once Rapper Bot was dismantled, Aisuru&#8217;s curators moved quickly to commandeer vulnerable IoT devices that were suddenly set adrift by the government&#8217;s takedown, Dobbins said.</p>
  357. <p>&#8220;Folks were arrested and Rapper Bot control servers were seized and that&#8217;s great, but unfortunately the botnet&#8217;s attack assets were then pieced out by the remaining botnets,&#8221; he said. &#8220;The problem is, even if those infected IoT devices are rebooted and cleaned up, they will still get re-compromised by something else generally within minutes of being plugged back in.&#8221;</p>
  358. <div id="attachment_72344" style="width: 748px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72344" decoding="async" loading="lazy" class=" wp-image-72344" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/xlabs-aisuru.png" alt="" width="738" height="810" /><p id="caption-attachment-72344" class="wp-caption-text">A screenshot shared by XLabs showing the Aisuru botmasters recently celebrating a record-breaking 7.7 Tbps DDoS. The user at the top has adopted the name &#8220;Ethan J. Foltz&#8221; in a mocking tribute to the alleged Rapper Bot operator who was arrested and charged in August 2025.</p></div>
  359. <h2>BOTMASTERS AT LARGE</h2>
  360. <p>XLab&#8217;s <a href="https://blog.xlab.qianxin.com/super-large-scale-botnet-aisuru-en/" target="_blank" rel="noopener">September blog post</a> cited multiple unnamed sources saying Aisuru is operated by three cybercriminals: &#8220;Snow,&#8221; who&#8217;s responsible for botnet development; &#8220;Tom,&#8221; tasked with finding new vulnerabilities; and &#8220;<strong>Forky</strong>,&#8221; responsible for botnet sales.</p>
  361. <p>KrebsOnSecurity interviewed Forky in our <a href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" target="_blank" rel="noopener">May 2025 story</a> about the record 6.3 Tbps attack from Aisuru. That story identified Forky as a 21-year-old man from Sao Paulo, Brazil who has been extremely active in the DDoS-for-hire scene since at least 2022. The FBI has seized Forky&#8217;s DDoS-for-hire domains several times over the years.</p>
  362. <p><img decoding="async" loading="lazy" class="aligncenter wp-image-71314" src="https://krebsonsecurity.com/wp-content/uploads/2025/05/forky.png" alt="" width="750" height="500" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/05/forky.png 779w, https://krebsonsecurity.com/wp-content/uploads/2025/05/forky-768x512.png 768w" sizes="(max-width: 750px) 100vw, 750px" /></p>
  363. <p>Like the original Mirai botmasters, Forky also operates a DDoS mitigation service called <strong>Botshield</strong>. Forky declined to discuss the makeup of his ISP’s clientele, or to clarify whether Botshield was more of a hosting provider or a DDoS mitigation firm. However, Forky has posted on Telegram about Botshield successfully mitigating large DDoS attacks launched against other DDoS-for-hire services.</p>
  364. <p>In our previous interview, Forky acknowledged being involved in the development and marketing of Aisuru, but denied participating in attacks launched by the botnet.</p>
  365. <p>Reached for comment earlier this month, Forky continued to maintain his innocence, claiming that he also is still trying to figure out who the current Aisuru botnet operators are in real life (Forky said the same thing in our May interview).</p>
  366. <p>But after a week of promising juicy details, Forky came up empty-handed once again. Suspecting that Forky was merely being coy, I asked him how someone so connected to the DDoS-for-hire world could still be mystified on this point, and suggested that his inability or unwillingness to blame anyone else for Aisuru would not exactly help his case.</p>
  367. <p>At this, Forky verbally bristled at being pressed for more details, and abruptly terminated our interview.</p>
  368. <p>&#8220;I&#8217;m not here to be threatened with ignorance because you are stressed,&#8221; Forky replied. &#8220;They&#8217;re blaming me for those new attacks. Pretty much the whole world (is) due to your blog.&#8221;</p>
  369. ]]></content:encoded>
  370. <wfw:commentRss>https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/feed/</wfw:commentRss>
  371. <slash:comments>79</slash:comments>
  372. </item>
  373. <item>
  374. <title>ShinyHunters Wage Broad Corporate Extortion Spree</title>
  375. <link>https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/</link>
  376. <comments>https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/#comments</comments>
  377. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  378. <pubDate>Tue, 07 Oct 2025 22:45:35 +0000</pubDate>
  379. <category><![CDATA[A Little Sunshine]]></category>
  380. <category><![CDATA[Latest Warnings]]></category>
  381. <category><![CDATA[Ne'er-Do-Well News]]></category>
  382. <category><![CDATA[Ransomware]]></category>
  383. <category><![CDATA[The Coming Storm]]></category>
  384. <category><![CDATA[ASYNCRAT]]></category>
  385. <category><![CDATA[Austin Larsen]]></category>
  386. <category><![CDATA[Charles Carmakal]]></category>
  387. <category><![CDATA[Crimson Collective]]></category>
  388. <category><![CDATA[CVE-2025-61882]]></category>
  389. <category><![CDATA[Oracle E-Business Suite]]></category>
  390. <category><![CDATA[Salesforce]]></category>
  391. <category><![CDATA[Salesloft]]></category>
  392. <category><![CDATA[Scattered LAPSUS$ Hunters]]></category>
  393. <category><![CDATA[ShinyHunters]]></category>
  394. <category><![CDATA[UNC6040]]></category>
  395. <category><![CDATA[UNC6395]]></category>
  396. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72279</guid>
  397.  
  398. <description><![CDATA[A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they refuse to pay a ransom. The group also claimed responsibility for a recent breach involving Discord user data, and for stealing terabytes of sensitive files from thousands of customers of the enterprise software maker Red Hat.]]></description>
  399. <content:encoded><![CDATA[<p>A cybercriminal group that used voice phishing attacks to siphon more than a billion records from <strong>Salesforce</strong> customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they refuse to pay a ransom. The group also claimed responsibility for a recent breach involving <strong>Discord</strong> user data, and for stealing terabytes of sensitive files from thousands of customers of the enterprise software maker <strong>Red Hat</strong>.</p>
  400. <div id="attachment_72275" style="width: 1285px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72275" decoding="async" loading="lazy" class="size-full wp-image-72275" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/sf-extortionsite.png" alt="" width="1275" height="879" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/sf-extortionsite.png 1275w, https://krebsonsecurity.com/wp-content/uploads/2025/10/sf-extortionsite-768x529.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/sf-extortionsite-782x539.png 782w, https://krebsonsecurity.com/wp-content/uploads/2025/10/sf-extortionsite-100x70.png 100w" sizes="(max-width: 1275px) 100vw, 1275px" /><p id="caption-attachment-72275" class="wp-caption-text">The new extortion website tied to ShinyHunters (UNC6040), which threatens to publish stolen data unless Salesforce or individual victim companies agree to pay a ransom.</p></div>
  401. <p>In May 2025, a prolific and amorphous English-speaking cybercrime group known as <strong>ShinyHunters</strong> launched a social engineering campaign that used voice phishing to trick targets into connecting a malicious app to their organization&#8217;s Salesforce portal.</p>
  402. <p>The first real details about the incident came in early June, when the <strong>Google Threat Intelligence Group </strong>(GTIG) <a href="https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion" target="_blank" rel="noopener">warned</a> that ShinyHunters &#8212; tracked by Google as <strong>UNC6040 </strong>&#8212; was extorting victims over their stolen Salesforce data, and that the group was poised to launch a data leak site to publicly shame victim companies into paying a ransom to keep their records private. A month later, Google acknowledged that one of its own corporate Salesforce instances was impacted in the voice phishing campaign.</p>
  403. <p>Last week, a new victim shaming blog dubbed &#8220;<strong>Scattered LAPSUS$ Hunters</strong>&#8221; began publishing the names of companies that had customer Salesforce data stolen as a result of the May voice phishing campaign.</p>
  404. <p>&#8220;Contact us to negotiate this ransom or all your customers data will be leaked,&#8221; the website stated in a message to Salesforce. &#8220;If we come to a resolution all individual extortions against your customers will be withdrawn from. Nobody else will have to pay us, if you pay, Salesforce, Inc.&#8221;</p>
  405. <p>Below that message were more than three dozen entries for companies that allegedly had Salesforce data stolen, including <strong>Toyota</strong>, <strong>FedEx</strong>, <strong>Disney/Hulu</strong>, and <strong>UPS</strong>. The entries for each company specified the volume of stolen data available, as well as the date that the information was retrieved (the stated breach dates range between May and September 2025).</p>
  406. <div id="attachment_72312" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72312" decoding="async" loading="lazy" class=" wp-image-72312" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/mandiant-sf.png" alt="" width="749" height="480" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/mandiant-sf.png 866w, https://krebsonsecurity.com/wp-content/uploads/2025/10/mandiant-sf-768x492.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/mandiant-sf-782x501.png 782w" sizes="(max-width: 749px) 100vw, 749px" /><p id="caption-attachment-72312" class="wp-caption-text">Image: Mandiant.</p></div>
  407. <p>On October 5, the Scattered LAPSUS$ Hunters victim shaming and extortion blog announced that the group was responsible for a breach in September involving a GitLab server used by Red Hat that contained more than 28,000 Git code repositories, including more than 5,000 Customer Engagement Reports (CERs).</p>
  408. <p>&#8220;Alot of folders have their client&#8217;s secrets such as artifactory access tokens, git tokens, azure, docker (redhat docker, azure containers, dockerhub), their client&#8217;s infrastructure details in the CERs like the audits that were done for them, and a whole LOT more, etc.,&#8221; the hackers claimed.</p>
  409. <p>Their claims came several days after a previously unknown hacker group calling itself the <strong>Crimson Collective</strong> took credit for the Red Hat intrusion on Telegram.</p>
  410. <p>Red Hat <a href="https://www.redhat.com/en/blog/security-update-incident-related-red-hat-consulting-gitlab-instance" target="_blank" rel="noopener">disclosed on October 2</a> that attackers had compromised a company GitLab server, and said it was in the process of notifying affected customers.</p>
  411. <p>&#8220;The compromised GitLab instance housed consulting engagement data, which may include, for example, Red Hat’s project specifications, example code snippets, internal communications about consulting services, and limited forms of business contact information,&#8221; Red Hat wrote.</p>
  412. <p>Separately, Discord has started emailing users affected by another breach claimed by ShinyHunters. Discord <a href="https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service" target="_blank" rel="noopener">said</a> an incident on September 20 at a &#8220;third-party customer service provider&#8221; impacted a &#8220;limited number of users&#8221; who communicated with Discord customer support or Trust &amp; Safety teams. The information included Discord usernames, emails, IP address, the last four digits of any stored payment cards, and government ID images submitted during age verification appeals.</p>
  413. <p>The Scattered Lapsus$ Hunters claim they will publish data stolen from Salesforce and its customers if ransom demands aren&#8217;t paid by October 10. The group also claims it will soon begin extorting hundreds more organizations that lost data in August after a cybercrime group stole <a href="https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chatbot-maker-salesloft/" target="_blank" rel="noopener">vast amounts of authentication tokens from <strong>Salesloft</strong></a>, whose AI chatbot is used by many corporate websites to convert customer interaction into Salesforce leads.</p>
  414. <p>In a communication sent to customers today, Salesforce emphasized that the theft of any third-party Salesloft data allegedly stolen by ShinyHunters did not originate from a vulnerability within the core Salesforce platform. The company also stressed that it has no plans to meet any extortion demands.</p>
  415. <p>&#8220;Salesforce will not engage, negotiate with, or pay any extortion demand,&#8221; the message to customers read. &#8220;Our focus is, and remains, on defending our environment, conducting thorough forensic analysis, supporting our customers, and working with law enforcement and regulatory authorities.&#8221;</p>
  416. <p>The GTIG tracked the group behind the Salesloft data thefts as <strong>UNC6395</strong>, and says the group has been observed harvesting the data for authentication tokens tied to a range of cloud services like Snowflake and Amazon&#8217;s AWS.</p>
  417. <p>Google catalogs Scattered Lapsus$ Hunters by so many UNC names (throw in <strong>UNC6240</strong> for good measure) because it is thought to be an amalgamation of three hacking groups &#8212; <strong>Scattered Spider</strong>, Lapsus$ and ShinyHunters. The members of these groups hail from many of the same chat channels on the <strong>Com</strong>, a mostly English-language cybercriminal community that operates across an ocean of Telegram and Discord servers.</p>
  418. <p>The Scattered Lapsus$ Hunters darknet blog is currently offline. The outage appears to have coincided with the disappearance of the group&#8217;s new clearnet blog &#8212; <strong>breachforums[.]hn</strong> &#8212; which vanished after shifting its Domain Name Service (DNS) servers from DDoS-Guard to Cloudflare.</p>
  419. <p>But before it died, the websites disclosed that hackers were exploiting a critical zero-day vulnerability in <strong>Oracle&#8217;s E-Business Suite</strong> software. Oracle has since <a href="https://www.oracle.com/security-alerts/alert-cve-2025-61882.html" target="_blank" rel="noopener">confirmed</a> that a security flaw tracked as <strong>CVE-2025-61882</strong> allows attackers to perform unauthenticated remote code execution, and is urging customers to apply an emergency update to address the weakness.</p>
  420. <p>Mandiant&#8217;s <strong>Charles Carmakal</strong> <a href="https://www.linkedin.com/posts/charlescarmakal_oracle-security-alert-advisory-cve-2025-activity-7380595612443893760-JNd_/" target="_blank" rel="noopener">shared on LinkedIn</a> that CVE-2025-61882 was initially exploited in August 2025 by the Clop ransomware gang to steal data from Oracle E-Business Suite servers. <strong>Bleeping Computer</strong> <a href="https://www.bleepingcomputer.com/news/security/oracle-patches-ebs-zero-day-exploited-in-clop-data-theft-attacks/" target="_blank" rel="noopener">writes</a> that news of the Oracle zero-day first surfaced on the Scattered Lapsus$ Hunters blog, which published a pair of scripts that were used to exploit vulnerable Oracle E-Business Suite instances.<span id="more-72279"></span></p>
  421. <p>On Monday evening, KrebsOnSecurity received a malware-laced message from a reader that threatened physical violence unless their unstated demands were met. The missive, titled &#8220;Shiny hunters,&#8221; contained the hashtag $LAPSU$$SCATEREDHUNTER, and urged me to visit a page on limewire[.]com to view their demands.</p>
  422. <div id="attachment_72306" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72306" decoding="async" loading="lazy" class=" wp-image-72306" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/sh-malwareemail.png" alt="" width="750" height="251" /><p id="caption-attachment-72306" class="wp-caption-text">A screenshot of the phishing message linking to a malicious trojan disguised as a Windows screensaver file.</p></div>
  423. <p>KrebsOnSecurity did not visit this link, but instead forwarded it to Mandiant, which confirmed that similar menacing missives were sent to employees at Mandiant and other security firms around the same time.</p>
  424. <p>The link in the message fetches a malicious trojan disguised as a Windows screensaver file (Virustotal&#8217;s analysis on this malware is <a href="https://www.virustotal.com/gui/file/9abe847b497e68919143d4da1bb34e565a7fa9991f51c8f6bb7e5911cee01a24" target="_blank" rel="noopener">here</a>). Simply viewing the booby-trapped screensaver on a Windows PC is enough to cause the bundled trojan to launch in the background.</p>
  425. <p>Mandiant&#8217;s <strong>Austin Larsen</strong> said the trojan is a commercially available backdoor known as <strong>ASYNCRAT</strong>, a .NET-based backdoor that communicates using a custom binary protocol over TCP, and can execute shell commands and download plugins to extend its features.</p>
  426. <div id="attachment_72292" style="width: 759px" class="wp-caption aligncenter"><a href="https://krebsonsecurity.com/wp-content/uploads/2025/10/shmalware-vt.png" target="_blank" rel="noopener"><img aria-describedby="caption-attachment-72292" decoding="async" loading="lazy" class="wp-image-72292" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/shmalware-vt.png" alt="" width="749" height="427" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/shmalware-vt.png 1334w, https://krebsonsecurity.com/wp-content/uploads/2025/10/shmalware-vt-768x438.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/shmalware-vt-782x446.png 782w" sizes="(max-width: 749px) 100vw, 749px" /></a><p id="caption-attachment-72292" class="wp-caption-text">A scan of the malicious screensaver file at Virustotal.com shows it is detected as bad by nearly a dozen security and antivirus tools.</p></div>
  427. <p>&#8220;Downloaded plugins may be executed directly in memory or stored in the registry,&#8221; Larsen wrote in an analysis shared via email. &#8220;Capabilities added via plugins include screenshot capture, file transfer, keylogging, video capture, and cryptocurrency mining. ASYNCRAT also supports a plugin that targets credentials stored by Firefox and Chromium-based web browsers.&#8221;</p>
  428. <p>Malware-laced targeted emails are not out of character for certain members of the Scattered Lapsus$ Hunters, who have previously harassed and threatened security researchers and even law enforcement officials who are investigating and warning about the extent of their attacks.</p>
  429. <p>With so many big data breaches and ransom attacks now coming from cybercrime groups operating on the Com, law enforcement agencies on both sides of the pond are under increasing pressure to apprehend the criminal hackers involved. In late September, prosecutors in the U.K. charged two alleged Scattered Spider members aged 18 and 19 with <a href="https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ransoms/" target="_blank" rel="noopener">extorting at least $115 million in ransom payments</a> from companies victimized by data theft.</p>
  430. <p>U.S. prosecutors heaped their own charges on the 19 year-old in that duo &#8212; U.K. resident <strong>Thalha Jubair </strong>&#8212; who is alleged to have been involved in data ransom attacks against <strong>Marks &amp; Spencer</strong> and <strong>Harrods</strong>, the British food retailer <strong>Co-op Group</strong>, and the 2023 intrusions at <strong>MGM Resorts</strong> and <strong>Caesars Entertainment</strong>. Jubair also was allegedly a key member of LAPSUS$, a cybercrime group that broke into dozens of technology companies beginning in late 2021.</p>
  431. <div id="attachment_72294" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72294" decoding="async" loading="lazy" class=" wp-image-72294" src="https://krebsonsecurity.com/wp-content/uploads/2025/10/beaumont-sh.png" alt="" width="749" height="218" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/10/beaumont-sh.png 1039w, https://krebsonsecurity.com/wp-content/uploads/2025/10/beaumont-sh-768x224.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/10/beaumont-sh-782x228.png 782w" sizes="(max-width: 749px) 100vw, 749px" /><p id="caption-attachment-72294" class="wp-caption-text">A Mastodon post by Kevin Beaumont, lamenting the prevalence of major companies paying millions to extortionist teen hackers, refers derisively to Thalha Jubair as a part of an APT threat known as &#8220;Advanced Persistent Teenagers.&#8221;</p></div>
  432. <p>In August, convicted Scattered Spider member and 20-year-old Florida man <strong>Noah Michael Urban</strong> was <a href="https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/" target="_blank" rel="noopener">sentenced to 10 years in federal prison</a> and ordered to pay roughly $13 million in restitution to victims.</p>
  433. <p>In April 2025, a 23-year-old Scottish man thought to be an early Scattered Spider member was <a href="https://krebsonsecurity.com/2025/04/alleged-scattered-spider-member-extradited-to-u-s/" target="_blank" rel="noopener">extradited from Spain to the U.S.</a>, where he is facing charges of wire fraud, conspiracy and identity theft. U.S. prosecutors allege <strong>Tyler Robert Buchanan</strong> and co-conspirators hacked into dozens of companies in the United States and abroad, and that he personally controlled more than $26 million stolen from victims.</p>
  434. <p><strong>Update, Oct. 8, 8:59 a.m. ET:</strong> A previous version of this story incorrectly referred to the malware sent by the reader as a Windows screenshot file. Rather, it is a Windows screensaver file.</p>
  435. ]]></content:encoded>
  436. <wfw:commentRss>https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/feed/</wfw:commentRss>
  437. <slash:comments>44</slash:comments>
  438. </item>
  439. <item>
  440. <title>Feds Tie &#8216;Scattered Spider&#8217; Duo to $115M in Ransoms</title>
  441. <link>https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ransoms/</link>
  442. <comments>https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ransoms/#comments</comments>
  443. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  444. <pubDate>Wed, 24 Sep 2025 11:48:31 +0000</pubDate>
  445. <category><![CDATA[A Little Sunshine]]></category>
  446. <category><![CDATA[Data Breaches]]></category>
  447. <category><![CDATA[Ne'er-Do-Well News]]></category>
  448. <category><![CDATA[Ransomware]]></category>
  449. <category><![CDATA[Allison Nixon]]></category>
  450. <category><![CDATA[ALPHV]]></category>
  451. <category><![CDATA[Amtrak]]></category>
  452. <category><![CDATA[Asyntax]]></category>
  453. <category><![CDATA[BlackCat]]></category>
  454. <category><![CDATA[Caesars Entertainment]]></category>
  455. <category><![CDATA[Com]]></category>
  456. <category><![CDATA[EarthtoStar]]></category>
  457. <category><![CDATA[Everlynn]]></category>
  458. <category><![CDATA[Flashpoint]]></category>
  459. <category><![CDATA[Harrods]]></category>
  460. <category><![CDATA[Infinity Recursion]]></category>
  461. <category><![CDATA[Lopiu]]></category>
  462. <category><![CDATA[Marks & Spencer]]></category>
  463. <category><![CDATA[MGM Resorts]]></category>
  464. <category><![CDATA[microsoft]]></category>
  465. <category><![CDATA[Noah Michael Urban]]></category>
  466. <category><![CDATA[NVIDIA]]></category>
  467. <category><![CDATA[Okta]]></category>
  468. <category><![CDATA[Owen David Flowers]]></category>
  469. <category><![CDATA[RocketAce]]></category>
  470. <category><![CDATA[Rockstar Games]]></category>
  471. <category><![CDATA[Samsung]]></category>
  472. <category><![CDATA[Scattered Spider]]></category>
  473. <category><![CDATA[Star Chat]]></category>
  474. <category><![CDATA[Star Sanctuary]]></category>
  475. <category><![CDATA[T-Mobile]]></category>
  476. <category><![CDATA[Thalha Jubair]]></category>
  477. <category><![CDATA[Transport for London]]></category>
  478. <category><![CDATA[Uber]]></category>
  479. <category><![CDATA[Unit 221B]]></category>
  480. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72208</guid>
  481.  
  482. <description><![CDATA[U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a prolific cybercrime group blamed for extorting at least $115 million in ransom payments from victims. The charges came as Jubair and an alleged co-conspirator appeared in a London court to face accusations of hacking into and extorting several large U.K. retailers, the London transit system, and healthcare providers in the United States.]]></description>
  483. <content:encoded><![CDATA[<p>U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national <strong>Thalha Jubair</strong> for allegedly being a core member of <strong>Scattered Spider</strong>, a prolific cybercrime group blamed for extorting at least $115 million in ransom payments from victims. The charges came as Jubair and an alleged co-conspirator appeared in a London court to face accusations of hacking into and extorting several large U.K. retailers, the London transit system, and healthcare providers in the United States.</p>
  484. <p>At a court hearing last week, U.K. prosecutors laid out a litany of charges against Jubair and 18-year-old <strong>Owen Flowers</strong>, accusing the teens of involvement in an August 2024 cyberattack that crippled <strong>Transport for London</strong>, the entity responsible for the public transport network in the Greater London area.</p>
  485. <div id="attachment_72226" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72226" decoding="async" loading="lazy" class=" wp-image-72226" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/paw-flowers-jubair.png" alt="" width="749" height="470" /><p id="caption-attachment-72226" class="wp-caption-text">A court artist sketch of Owen Flowers (left) and Thalha Jubair appearing at Westminster Magistrates&#8217; Court last week. Credit: Elizabeth Cook, PA Wire.</p></div>
  486. <p>On July 10, 2025, KrebsOnSecurity <a href="https://krebsonsecurity.com/2025/07/uk-charges-four-in-scattered-spider-ransom-group/" target="_blank" rel="noopener">reported</a> that Flowers and Jubair had been arrested in the United Kingdom in connection with recent Scattered Spider <a href="https://www.thetimes.com/uk/technology-uk/article/ransoms-hackers-cyber-crime-t5kjldwwm" target="_blank" rel="noopener">ransom attacks</a> against the retailers <strong>Marks &amp; Spencer</strong> and <strong>Harrods</strong>, and the British food retailer <strong>Co-op Group</strong>.</p>
  487. <p>That story cited sources close to the investigation saying Flowers was the Scattered Spider member who anonymously gave interviews to the media in the days after the group&#8217;s September 2023 ransomware attacks disrupted operations at Las Vegas casinos operated by <strong>MGM Resorts</strong> and <strong>Caesars Entertainment</strong>.</p>
  488. <p>The story also noted that Jubair&#8217;s alleged handles on cybercrime-focused Telegram channels had far lengthier rap sheets involving some of the more consequential and headline-grabbing data breaches over the past four years. What follows is an account of cybercrime activities that prosecutors have attributed to Jubair&#8217;s alleged hacker handles, as told by those accounts in posts to public Telegram channels that are closely monitored by multiple cyber intelligence firms.</p>
  489. <h2>EARLY DAYS (2021-2022)</h2>
  490. <p>Jubair is alleged to have been a core member of the <strong>LAPSUS$</strong> cybercrime group that <a href="https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/" target="_blank" rel="noopener">broke into dozens of technology companies beginning in late 2021</a>, stealing source code and other internal data from tech giants including <strong>Microsoft</strong>, <strong>Nvidia</strong>, <strong>Okta</strong>, <strong>Rockstar Games</strong>, <strong>Samsung</strong>, <strong>T-Mobile</strong>, and <strong>Uber</strong>.</p>
  491. <p>That is, according to the former leader of the now-defunct LAPSUS$. In April 2022, KrebsOnSecurity <a href="https://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/" target="_blank" rel="noopener">published internal chat records</a> taken from a server that LAPSUS$ used, and those chats indicate Jubair was working with the group using the nicknames <strong>Amtrak</strong> and <strong>Asyntax</strong>. In the middle of the gang&#8217;s cybercrime spree, Asyntax told the LAPSUS$ leader not to share T-Mobile’s logo in images sent to the group because he’d been previously busted for SIM-swapping and his parents would suspect he was back at it again.</p>
  492. <p>The leader of LAPSUS$ responded by gleefully posting Asyntax&#8217;s real name, phone number, and other hacker handles into a public chat room on Telegram:</p>
  493. <div id="attachment_59487" class="wp-caption aligncenter">
  494. <div id="attachment_59487" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-59487" decoding="async" loading="lazy" class="wp-image-59487" src="https://krebsonsecurity.com/wp-content/uploads/2022/04/amtraxdox.png" alt="" width="749" height="207" aria-describedby="caption-attachment-59487" /><p id="caption-attachment-59487" class="wp-caption-text">In March 2022, the leader of the LAPSUS$ data extortion group exposed Thalha Jubair’s name and hacker handles in a public chat room on Telegram.</p></div>
  495. </div>
  496. <p><span id="more-70968"></span>That story about the leaked LAPSUS$ chats also connected Amtrak/Asyntax to several previous hacker identities, including “<strong>Everlynn</strong>,” who in April 2021 began offering a cybercriminal service that <a href="https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/" target="_blank" rel="noopener">sold fraudulent “emergency data requests”</a> targeting the major social media and email providers.</p>
  497. <p>In these so-called &#8220;fake EDR&#8221; schemes, the hackers compromise email accounts tied to police departments and government agencies, and then send unauthorized demands for subscriber data (e.g. username, IP/email address), while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death.</p>
  498. <div id="attachment_59127" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-59127" decoding="async" loading="lazy" class=" wp-image-59127" src="https://krebsonsecurity.com/wp-content/uploads/2022/03/infinityrecursion.png" alt="" width="750" height="623" srcset="https://krebsonsecurity.com/wp-content/uploads/2022/03/infinityrecursion.png 864w, https://krebsonsecurity.com/wp-content/uploads/2022/03/infinityrecursion-768x638.png 768w, https://krebsonsecurity.com/wp-content/uploads/2022/03/infinityrecursion-782x650.png 782w" sizes="(max-width: 750px) 100vw, 750px" /><p id="caption-attachment-59127" class="wp-caption-text">The roster of the now-defunct &#8220;Infinity Recursion&#8221; hacking team, which sold fake EDRs between 2021 and 2022. The founder &#8220;Everlynn&#8221; has been tied to Jubair. The member listed as “Peter” became the leader of LAPSUS$ who would later post Jubair’s name, phone number and hacker handles into LAPSUS$’s chat channel.</p></div>
  499. <p><span id="more-72208"></span></p>
  500. <h2>EARTHTOSTAR</h2>
  501. <p>Prosecutors in New Jersey last week <a href="https://www.justice.gov/opa/pr/united-kingdom-national-charged-connection-multiple-cyber-attacks-including-critical" target="_blank" rel="noopener">alleged</a> Jubair was part of a threat group variously known as Scattered Spider, <strong>0ktapus</strong>, and <strong>UNC3944</strong>, and that he used the nicknames <strong>EarthtoStar</strong>, <strong>Brad</strong>, <strong>Austin</strong>, and <strong>Austistic</strong>.</p>
  502. <p>Beginning in 2022, EarthtoStar co-ran a bustling Telegram channel called <strong>Star Chat</strong>, which was home to a prolific SIM-swapping group that relentlessly used voice- and SMS-based phishing attacks to steal credentials from employees at the major wireless providers in the U.S. and U.K.</p>
  503. <div id="attachment_71644" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-71644" decoding="async" loading="lazy" class=" wp-image-71644" src="https://krebsonsecurity.com/wp-content/uploads/2025/07/ace-earth2star-starchat.png" alt="" width="750" height="307" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/07/ace-earth2star-starchat.png 1153w, https://krebsonsecurity.com/wp-content/uploads/2025/07/ace-earth2star-starchat-768x314.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/07/ace-earth2star-starchat-782x320.png 782w" sizes="(max-width: 750px) 100vw, 750px" /><p id="caption-attachment-71644" class="wp-caption-text">Jubair allegedly used the handle &#8220;Earth2Star,&#8221; a core member of a prolific SIM-swapping group operating in 2022. This ad produced by the group lists various prices for SIM swaps.</p></div>
  504. <p>The group would then use that access to sell a SIM-swapping service that could redirect a target&#8217;s phone number to a device the attackers controlled, allowing them to intercept the victim&#8217;s phone calls and text messages (including one-time codes). Members of Star Chat targeted multiple wireless carriers with SIM-swapping attacks, but they focused mainly on phishing T-Mobile employees.</p>
  505. <p>In February 2023, KrebsOnSecurity scrutinized more than seven months of these SIM-swapping solicitations on Star Chat, which almost daily peppered the public channel with &#8220;Tmo up!&#8221; and &#8220;Tmo down!&#8221; notices indicating periods wherein the group claimed to have active access to T-Mobile&#8217;s network.</p>
  506. <div id="attachment_72238" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72238" decoding="async" loading="lazy" class=" wp-image-72238" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/rocketace-tmobile.png" alt="" width="750" height="848" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/09/rocketace-tmobile.png 809w, https://krebsonsecurity.com/wp-content/uploads/2025/09/rocketace-tmobile-768x869.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/09/rocketace-tmobile-782x884.png 782w" sizes="(max-width: 750px) 100vw, 750px" /><p id="caption-attachment-72238" class="wp-caption-text">A redacted receipt from Star Chat&#8217;s SIM-swapping service targeting a T-Mobile customer after the group gained access to internal T-Mobile employee tools.</p></div>
  507. <p>The data showed that Star Chat &#8212; along with two other SIM-swapping groups operating at the same time &#8212; <a href="https://krebsonsecurity.com/2023/02/hackers-claim-they-breached-t-mobile-more-than-100-times-in-2022/" target="_blank" rel="noopener">collectively broke into T-Mobile over a hundred times in the last seven months of 2022</a>. However, Star Chat was by far the most prolific of the three, responsible for at least 70 of those incidents.</p>
  508. <div id="attachment_62908" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-62908" decoding="async" loading="lazy" class=" wp-image-62908" src="https://krebsonsecurity.com/wp-content/uploads/2023/02/tmodates.png" alt="" width="749" height="496" srcset="https://krebsonsecurity.com/wp-content/uploads/2023/02/tmodates.png 1040w, https://krebsonsecurity.com/wp-content/uploads/2023/02/tmodates-768x509.png 768w, https://krebsonsecurity.com/wp-content/uploads/2023/02/tmodates-782x518.png 782w" sizes="(max-width: 749px) 100vw, 749px" /><p id="caption-attachment-62908" class="wp-caption-text">The 104 days in the latter half of 2022 in which different known SIM-swapping groups claimed access to T-Mobile employee tools. Star Chat was responsible for a majority of these incidents. Image: krebsonsecurity.com.</p></div>
  509. <p>A review of EarthtoStar&#8217;s messages on Star Chat as indexed by the threat intelligence firm <strong>Flashpoint</strong> shows this person also sold &#8220;AT&amp;T email resets&#8221; and AT&amp;T call forwarding services for up to $1,200 per line. EarthtoStar explained the purpose of this service in post on Telegram:</p>
  510. <blockquote><p>&#8220;Ok people are confused, so you know when u login to chase and it says &#8216;2fa required&#8217; or whatever the fuck, well it gives you two options, SMS or Call. If you press call, and I forward the line to you then who do you think will get said call?&#8221;</p></blockquote>
  511. <p>New Jersey prosecutors allege Jubair also was involved in a <a href="https://krebsonsecurity.com/2022/08/how-1-time-passcodes-became-a-corporate-liability/" target="_blank" rel="noopener">mass SMS phishing campaign during the summer of 2022</a> that stole single sign-on credentials from employees at hundreds of companies. The text messages asked users to click a link and log in at a phishing page that mimicked their employer’s <strong>Okta</strong> authentication page, saying recipients needed to review pending changes to their upcoming work schedules.</p>
  512. <p>The phishing websites used a Telegram instant message bot to forward any submitted credentials in real-time, allowing the attackers to use the phished username, password and one-time code to log in as that employee at the real employer website.</p>
  513. <p>That weeks-long SMS phishing campaign led to intrusions and data thefts at more than 130 organizations, including <strong>LastPass</strong>, <strong>DoorDash</strong>, <strong>Mailchimp</strong>, <strong>Plex</strong> and <strong>Signal</strong>.</p>
  514. <div id="attachment_61104" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-61104" decoding="async" loading="lazy" class=" wp-image-61104" src="https://krebsonsecurity.com/wp-content/uploads/2022/08/amitaico.png" alt="" width="750" height="441" srcset="https://krebsonsecurity.com/wp-content/uploads/2022/08/amitaico.png 1427w, https://krebsonsecurity.com/wp-content/uploads/2022/08/amitaico-768x452.png 768w, https://krebsonsecurity.com/wp-content/uploads/2022/08/amitaico-782x460.png 782w" sizes="(max-width: 750px) 100vw, 750px" /><p id="caption-attachment-61104" class="wp-caption-text">A visual depiction of the attacks by the SMS phishing group known as 0ktapus, ScatterSwine, and Scattered Spider. Image: Amitai Cohen twitter.com/amitaico.</p></div>
  515. <h2>DA, COMRADE</h2>
  516. <p>EarthtoStar&#8217;s group Star Chat specialized in phishing their way into business process outsourcing (BPO) companies that provide customer support for a range of multinational companies, including a number of the world&#8217;s largest telecommunications providers. In May 2022, EarthtoStar posted to the Telegram channel &#8220;Frauwudchat&#8221;:</p>
  517. <blockquote><p>&#8220;Hi, I am looking for partners in order to exfiltrate data from large telecommunications companies/call centers/alike, I have major experience in this field, [including] a massive call center which houses 200,000+ employees where I have dumped all user credentials and gained access to the [domain controller] + obtained global administrator I also have experience with REST API&#8217;s and programming. I have extensive experience with VPN, Citrix, cisco anyconnect, social engineering + privilege escalation. If you have any Citrix/Cisco VPN or any other useful things please message me and lets work.&#8221;</p></blockquote>
  518. <p>At around the same time in the Summer of 2022, at least two different accounts tied to Star Chat &#8212; &#8220;<strong>RocketAce</strong>&#8221; and &#8220;<strong>Lopiu</strong>&#8221; &#8212; introduced the group&#8217;s services to denizens of the Russian-language cybercrime forum <strong>Exploit</strong>, including:</p>
  519. <p>-SIM-swapping services targeting Verizon and T-Mobile customers;<br />
  520. -Dynamic phishing pages targeting customers of single sign-on providers like Okta;<br />
  521. -Malware development services;<br />
  522. -The sale of extended validation (EV) code signing certificates.</p>
  523. <div id="attachment_72222" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72222" decoding="async" loading="lazy" class=" wp-image-72222" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/kela-lopiu.png" alt="" width="749" height="414" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/09/kela-lopiu.png 1010w, https://krebsonsecurity.com/wp-content/uploads/2025/09/kela-lopiu-768x424.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/09/kela-lopiu-782x432.png 782w" sizes="(max-width: 749px) 100vw, 749px" /><p id="caption-attachment-72222" class="wp-caption-text">The user &#8220;Lopiu&#8221; on the Russian cybercrime forum Exploit advertised many of the same unique services offered by EarthtoStar and other Star Chat members. Image source: ke-la.com.</p></div>
  524. <p>These two accounts on Exploit created multiple sales threads in which they claimed administrative access to U.S. telecommunications providers and asked other Exploit members for help in monetizing that access. In June 2022, RocketAce, which appears to have been just one of EarthtoStar&#8217;s many aliases, posted to Exploit:</p>
  525. <blockquote><p>Hello. I have access to a telecommunications company&#8217;s citrix and vpn. I would like someone to help me break out of the system and potentially attack the domain controller so all logins can be extracted we can discuss payment and things leave your telegram in the comments or private message me ! Looking for someone with knowledge in citrix/privilege escalation</p></blockquote>
  526. <p>On Nov. 15, 2022, EarthtoStar posted to their <strong>Star Sanctuary</strong> Telegram channel that they were hiring malware developers with a minimum of three years of experience and the ability to develop rootkits, backdoors and malware loaders.</p>
  527. <p>&#8220;Optional: Endorsed by advanced APT Groups (e.g. Conti, Ryuk),&#8221; the ad concluded, referencing two of Russia&#8217;s most rapacious and destructive ransomware affiliate operations. &#8220;Part of a nation-state / ex-3l (3 letter-agency).&#8221;</p>
  528. <h2>2023-PRESENT DAY</h2>
  529. <p>The Telegram and Discord chat channels wherein Flowers and Jubair allegedly planned and executed their extortion attacks are part of a loose-knit network known as the <strong>Com</strong>, an English-speaking cybercrime community consisting mostly of individuals living in the United States, the United Kingdom, Canada and Australia.</p>
  530. <p>Many of these Com chat servers have hundreds to thousands of members each, and some of the more interesting solicitations on these communities are job offers for in-person assignments and tasks that can be found if one searches for posts titled, “If you live near,” or “IRL job” — short for “in real life” job.</p>
  531. <p>These &#8220;<a href="https://krebsonsecurity.com/2022/09/violence-as-a-service-brickings-firebombings-shootings-for-hire/" target="_blank" rel="noopener">violence-as-a-service</a>&#8221; solicitations typically involve “brickings,” where someone is hired to toss a brick through the window at a specified address. Other IRL jobs for hire include tire-stabbings, molotov cocktail hurlings, drive-by shootings, and even home invasions. The people targeted by these services are typically other criminals within the community, but it&#8217;s not unusual to see Com members asking others for help in harassing or intimidating security researchers and even the very law enforcement officers who are investigating their alleged crimes.</p>
  532. <p>It remains unclear what precipitated this incident or what followed directly after, but on January 13, 2023, a Star Sanctuary account used by EarthtoStar solicited the home invasion of a sitting U.S. federal prosecutor from New York. That post included a photo of the prosecutor taken from the Justice Department&#8217;s website, along with the message:</p>
  533. <blockquote><p>&#8220;Need irl niggas, in home hostage shit no fucking pussies no skinny glock holding 100 pound niggas either&#8221;</p></blockquote>
  534. <p>Throughout late 2022 and early 2023, EarthtoStar&#8217;s alias &#8220;Brad&#8221; (a.k.a. &#8220;Brad_banned&#8221;) frequently advertised Star Chat&#8217;s malware development services, including custom malicious software designed to hide the attacker&#8217;s presence on a victim machine:</p>
  535. <blockquote><p>We can develop KERNEL malware which will achieve persistence for a long time,<br />
  536. bypass firewalls and have reverse shell access.</p>
  537. <p>This shit is literally like STAGE 4 CANCER FOR COMPUTERS!!!</p>
  538. <p>Kernel meaning the highest level of authority on a machine.<br />
  539. This can range to simple shells to Bootkits.</p>
  540. <p>Bypass all major EDR&#8217;s (SentinelOne, CrowdStrike, etc)<br />
  541. Patch EDR&#8217;s scanning functionality so it&#8217;s rendered useless!</p>
  542. <p>Once implanted, extremely difficult to remove (basically impossible to even find)<br />
  543. Development Experience of several years and in multiple APT Groups.</p>
  544. <p>Be one step ahead of the game. Prices start from $5,000+. Message @brad_banned to get a quote</p></blockquote>
  545. <p>In September 2023 , both MGM Resorts and Caesars Entertainment suffered ransomware attacks at the hands of a Russian ransomware affiliate program known as <strong>ALPHV</strong> and <strong>BlackCat</strong>. Caesars <a href="https://www.courtwatch.news/p/how-the-fbi-tracked-down-the-15-million-caesars-casino-ransom" target="_blank" rel="noopener">reportedly paid a $15 million ransom</a> in that incident.</p>
  546. <p>Within hours of MGM publicly acknowledging the 2023 breach, members of Scattered Spider were claiming credit and telling reporters they&#8217;d broken in by social engineering a third-party IT vendor. At a hearing in London last week, U.K. prosecutors told the court Jubair was found in possession of more than $50 million in ill-gotten cryptocurrency, including funds that were linked to the Las Vegas casino hacks.</p>
  547. <p>The Star Chat channel was finally banned by Telegram on March 9, 2025. But U.S. prosecutors say Jubair and fellow Scattered Spider members continued their hacking, phishing and extortion activities up until September 2025.</p>
  548. <p>In April 2025, the Com was buzzing about the publication of &#8220;<strong>The Com Cast</strong>,&#8221; a lengthy screed detailing Jubair&#8217;s alleged cybercriminal activities and nicknames over the years. This account included photos and voice recordings allegedly of Jubair, and asserted that in his early days on the Com Jubair used the nicknames Clark and Miku (these are both aliases used by Everlynn in connection with their fake EDR services).</p>
  549. <div id="attachment_72224" style="width: 667px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72224" decoding="async" loading="lazy" class="size-full wp-image-72224" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/comcast-jubair.png" alt="" width="657" height="507" /><p id="caption-attachment-72224" class="wp-caption-text">Thalha Jubair (right), without his large-rimmed glasses, in an undated photo posted in The Com Cast.</p></div>
  550. <p>More recently, the anonymous Com Cast author(s) claimed, Jubair had used the nickname &#8220;Operator,&#8221; which corresponds to a Com member who ran an automated Telegram-based doxing service that pulled consumer records from hacked data broker accounts. That public outing came after Operator allegedly seized control over the <strong>Doxbin</strong>, a long-running and highly toxic community that is used to &#8220;dox&#8221; or post deeply personal information on people.</p>
  551. <p>&#8220;Operator/Clark/Miku: A key member of the ransomware group Scattered Spider, which consists of a diverse mix of individuals involved in SIM swapping and phishing,&#8221; the Com Cast account stated. &#8220;The group is an amalgamation of several key organizations, including Infinity Recursion (owned by Operator), True Alcorians (owned by earth2star), and Lapsus, which have come together to form a single collective.&#8221;</p>
  552. <p>The New Jersey <a href="https://s3.documentcloud.org/documents/26103409/thalhajubaircomplaint.pdf" target="_blank" rel="noopener">complaint</a> (PDF) alleges Jubair and other Scattered Spider members committed computer fraud, wire fraud, and money laundering in relation to at least 120 computer network intrusions involving 47 U.S. entities between May 2022 and September 2025. The complaint alleges the group&#8217;s victims paid at least $115 million in ransom payments.</p>
  553. <p>U.S. authorities say they traced some of those payments to Scattered Spider to an Internet server controlled by Jubair. The complaint states that a cryptocurrency wallet discovered on that server was used to purchase several gift cards, one of which was used at a food delivery company to send food to his apartment. Another gift card purchased with cryptocurrency from the same server was allegedly used to fund online gaming accounts under Jubair&#8217;s name. U.S. prosecutors said that when they seized that server they also seized $36 million in cryptocurrency.</p>
  554. <p>The complaint also charges Jubair with involvement in a hacking incident in January 2025 against the U.S. courts system that targeted a U.S. magistrate judge overseeing a related Scattered Spider investigation. That other investigation appears to have been the prosecution of <strong>Noah Michael Urban</strong>, a 20-year-old Florida man <a href="https://krebsonsecurity.com/2024/11/feds-charge-five-men-in-scattered-spider-roundup/" target="_blank" rel="noopener">charged in November 2024 by prosecutors in Los Angeles</a> as one of five alleged Scattered Spider members.</p>
  555. <p>Urban pleaded guilty in April 2025 to wire fraud and conspiracy charges, and in August he was sentenced to 10 years in federal prison. Speaking with KrebsOnSecurity from jail after his sentencing, Urban asserted that the judge gave him more time than prosecutors requested because <a href="https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/" target="_blank" rel="noopener">he was mad that Scattered Spider hacked his email account</a>.</p>
  556. <div id="attachment_71970" style="width: 611px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-71970" decoding="async" loading="lazy" class="size-full wp-image-71970" src="https://krebsonsecurity.com/wp-content/uploads/2025/08/kingbobtweets.png" alt="" width="601" height="485" /><p id="caption-attachment-71970" class="wp-caption-text">Noah &#8220;Kingbob&#8221; Urban, posting to Twitter/X around the time of his sentencing on Aug. 20.</p></div>
  557. <p>A <a href="https://krebsonsecurity.com/wp-content/uploads/2025/08/urban-status-hack.pdf" target="_blank" rel="noopener">court transcript</a> (PDF) from a status hearing in February 2025 shows Urban was telling the truth about the hacking incident that happened while he was in federal custody. The judge told attorneys for both sides that a co-defendant in the California case was trying to find out about Mr. Urban’s activity in the Florida case, and that the hacker accessed the account by impersonating a judge over the phone and requesting a password reset.</p>
  558. <p><strong>Allison Nixon</strong> is chief research officer at the New York based security firm <strong>Unit 221B</strong>, and easily one of the world&#8217;s leading experts on Com-based cybercrime activity. Nixon said the core problem with legally prosecuting well-known cybercriminals from the Com has traditionally been that the top offenders tend to be under the age of 18, and thus difficult to charge under federal hacking statutes.</p>
  559. <p>In the United States, prosecutors typically wait until an underage cybercrime suspect becomes an adult to charge them. But until that day comes, she said, Com actors often feel emboldened to continue committing &#8212; and very often bragging about &#8212; serious cybercrime offenses.</p>
  560. <p>&#8220;Here we have a special category of Com offenders that effectively enjoy legal immunity,&#8221; Nixon told KrebsOnSecurity. &#8220;Most get recruited to Com groups when they are older, but of those that join very young, such as 12 or 13, they seem to be the most dangerous because at that age they have no grounding in reality and so much longevity before they exit their legal immunity.”</p>
  561. <p>Nixon said U.K. authorities face the same challenge when they briefly detain and search the homes of underage Com suspects: Namely, the teen suspects simply go right back to their respective cliques in the Com and start robbing and hurting people again the minute they&#8217;re released.</p>
  562. <p>Indeed, the U.K. court heard from prosecutors last week that both Scattered Spider suspects were detained and/or searched by local law enforcement on multiple occasions, only to return to the Com less than 24 hours after being released each time.</p>
  563. <p>&#8220;What we see is these young Com members become vectors for perpetrators to commit enormously harmful acts and even child abuse,&#8221; Nixon said. &#8220;The members of this special category of people who enjoy legal immunity are meeting up with foreign nationals and conducting these sometimes heinous acts at their behest.&#8221;</p>
  564. <p>Nixon said many of these individuals have few friends in real life because they spend virtually all of their waking hours on Com channels, and so their entire sense of identity, community and self-worth gets wrapped up in their involvement with these online gangs. She said if the law was such that prosecutors could treat these people commensurate with the amount of harm they cause society, that would probably clear up a lot of this problem.</p>
  565. <p>&#8220;If law enforcement was allowed to keep them in jail, they would quit reoffending,&#8221; she said.</p>
  566. <p><em>The Times of London</em> <a href="https://www.thetimes.com/uk/technology-uk/article/teenagers-charged-tfl-cyberattack-scattered-spider-trdhs5rwf" target="_blank" rel="noopener">reports</a> that Flowers is facing three charges under the Computer Misuse Act: two of conspiracy to commit an unauthorized act in relation to a computer causing/creating risk of serious damage to human welfare/national security and one of attempting to commit the same act. Maximum sentences for these offenses can range from 14 years to life in prison, depending on the impact of the crime.</p>
  567. <p>Jubair is reportedly facing two charges in the U.K.: One of conspiracy to commit an unauthorized act in relation to a computer causing/creating risk of serious damage to human welfare/national security and one of failing to comply with a section 49 notice to disclose the key to protected information.</p>
  568. <p>In the United States, Jubair is charged with computer fraud conspiracy, two counts of computer fraud, wire fraud conspiracy, two counts of wire fraud, and money laundering conspiracy. If extradited to the U.S., tried and convicted on all charges, he faces a maximum penalty of 95 years in prison.</p>
  569. <p>In July 2025, the United Kingdom barred victims of hacking from paying ransoms to cybercriminal groups unless approved by officials. U.K. organizations that are considered part of critical infrastructure <a href="https://www.thetimes.com/uk/technology-uk/article/ransoms-hackers-cyber-crime-t5kjldwwm" target="_blank" rel="noopener">reportedly</a> will face a complete ban, as will the entire public sector. U.K. victims of a hack are now required to notify officials to better inform policymakers on the scale of Britain&#8217;s ransomware problem.</p>
  570. <p>For further reading (bless you), check out <a href="https://www.bloomberg.com/news/features/2025-09-19/multimillion-dollar-hacking-spree-scattered-spider-teen-s-jailhouse-confessions" target="_blank" rel="noopener">Bloomberg&#8217;s poignant story</a> last week based on a year&#8217;s worth of jailhouse interviews with convicted Scattered Spider member Noah Urban.</p>
  571. ]]></content:encoded>
  572. <wfw:commentRss>https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ransoms/feed/</wfw:commentRss>
  573. <slash:comments>46</slash:comments>
  574. </item>
  575. <item>
  576. <title>Self-Replicating Worm Hits 180+ Software Packages</title>
  577. <link>https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/</link>
  578. <comments>https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/#comments</comments>
  579. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  580. <pubDate>Tue, 16 Sep 2025 14:08:02 +0000</pubDate>
  581. <category><![CDATA[Latest Warnings]]></category>
  582. <category><![CDATA[The Coming Storm]]></category>
  583. <category><![CDATA[Time to Patch]]></category>
  584. <category><![CDATA[Web Fraud 2.0]]></category>
  585. <category><![CDATA[Aikido]]></category>
  586. <category><![CDATA[Ashish Kurmi]]></category>
  587. <category><![CDATA[Charlie Eriksen]]></category>
  588. <category><![CDATA[GitHub]]></category>
  589. <category><![CDATA[International Computer Science Institute]]></category>
  590. <category><![CDATA[Nicholas Weaver]]></category>
  591. <category><![CDATA[NPM]]></category>
  592. <category><![CDATA[Shai-Hulud worm]]></category>
  593. <category><![CDATA[StepSecurity]]></category>
  594. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72190</guid>
  595.  
  596. <description><![CDATA[At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages from the security vendor CrowdStrike, steals and publishes even more credentials every time an infected package is installed.]]></description>
  597. <content:encoded><![CDATA[<p>At least 187 code packages made available through the JavaScript repository <strong>NPM</strong> have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on <strong>GitHub</strong>, experts warn. The malware, which briefly infected multiple code packages from the security vendor <strong>CrowdStrike</strong>, steals and publishes even more credentials every time an infected package is installed.</p>
  598. <div id="attachment_72194" style="width: 714px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72194" decoding="async" loading="lazy" class=" wp-image-72194" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/shai-hulud.png" alt="" width="704" height="619" /><p id="caption-attachment-72194" class="wp-caption-text">Image: https://en.wikipedia.org/wiki/Sandworm_(Dune)</p></div>
  599. <p>The novel malware strain is being dubbed <strong>Shai-Hulud</strong> &#8212; after the name for the giant sandworms in Frank Herbert&#8217;s <em>Dune</em> novel series &#8212; because it publishes any stolen credentials in a new public GitHub repository that includes the name &#8220;Shai-Hulud.&#8221;</p>
  600. <p>&#8220;When a developer installs a compromised package, the malware will look for a npm token in the environment,&#8221; said <strong>Charlie Eriksen</strong>, a researcher for the Belgian security firm <a href="https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again" target="_blank" rel="noopener">Aikido</a>. &#8220;If it finds it, it will modify the 20 most popular packages that the npm token has access to, copying itself into the package, and publishing a new version.&#8221;</p>
  601. <p>At the center of this developing maelstrom are code libraries available on <a href="https://www.npmjs.com/" target="_blank" rel="noopener"><strong>NPM</strong></a> (short for “Node Package Manager”), which acts as a central hub for JavaScript development and provides the latest updates to widely-used JavaScript components.</p>
  602. <p>The Shai-Hulud worm emerged just days after unknown attackers <a href="https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-steal-crypto/" target="_blank" rel="noopener">launched a broad phishing campaign</a> that spoofed NPM and asked developers to &#8220;update&#8221; their multi-factor authentication login options. That attack led to malware being inserted into at least two-dozen NPM code packages, but the outbreak was quickly contained and was narrowly focused on siphoning cryptocurrency payments.</p>
  603. <div id="attachment_72195" style="width: 759px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72195" decoding="async" loading="lazy" class=" wp-image-72195" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/shai-hulud-packages.png" alt="" width="749" height="440" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/09/shai-hulud-packages.png 961w, https://krebsonsecurity.com/wp-content/uploads/2025/09/shai-hulud-packages-768x451.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/09/shai-hulud-packages-782x459.png 782w" sizes="(max-width: 749px) 100vw, 749px" /><p id="caption-attachment-72195" class="wp-caption-text">Image: aikido.dev</p></div>
  604. <p>In late August, another compromise of an NPM developer resulted in malware being added to &#8220;<strong>nx</strong>,&#8221; an open-source code development toolkit with as many as six million weekly downloads. In the nx compromise, the attackers introduced code that scoured the user’s device for authentication tokens from programmer destinations like GitHub and NPM, as well as SSH and API keys. But instead of sending those stolen credentials to a central server controlled by the attackers, the malicious nx code created a new public repository in the victim’s GitHub account, and published the stolen data there for all the world to see and download.</p>
  605. <p>Last month&#8217;s attack on nx did not self-propagate like a worm, but this Shai-Hulud malware does and bundles reconnaissance tools to assist in its spread. Namely, it uses the open-source tool <a href="https://github.com/trufflesecurity/trufflehog" target="_blank" rel="noopener">TruffleHog</a> to search for exposed credentials and access tokens on the developer&#8217;s machine. It then attempts to create new GitHub actions and publish any stolen secrets.</p>
  606. <p>&#8220;Once the first person got compromised, there was no stopping it,&#8221; Aikido&#8217;s Eriksen told KrebsOnSecurity. He said the first NPM package compromised by this worm appears to have been altered on Sept. 14, around 17:58 UTC.</p>
  607. <p>The security-focused code development platform <strong>socket.dev</strong> <a href="https://socket.dev/blog/ongoing-supply-chain-attack-targets-crowdstrike-npm-packages" target="_blank" rel="noopener">reports</a> the Shai-Halud attack briefly compromised at least 25 NPM code packages managed by CrowdStrike. Socket.dev said the affected packages were quickly removed by the NPM registry.</p>
  608. <p>In a written statement shared with KrebsOnSecurity, CrowdStrike said that after detecting several malicious packages in the public NPM registry, the company swiftly removed them and rotated its keys in public registries.</p>
  609. <p>&#8220;These packages are not used in the Falcon sensor, the platform is not impacted and customers remain protected,&#8221; the statement reads, referring to the company&#8217;s widely-used endpoint threat detection service. &#8220;We are working with NPM and conducting a thorough investigation.&#8221;<span id="more-72190"></span></p>
  610. <p>A <a href="https://www.stepsecurity.io/blog/ctrl-tinycolor-and-40-npm-packages-compromised" target="_blank" rel="noopener">writeup on the attack</a> from <strong>StepSecurity</strong> found that for cloud-specific operations, the malware enumerates AWS, Azure and Google Cloud Platform secrets. It also found the entire attack design assumes the victim is working in a Linux or macOS environment, and that it deliberately skips Windows systems.</p>
  611. <p>StepSecurity said Shai-Hulud spreads by using stolen NPM authentication tokens, adding its code to the top 20 packages in the victim&#8217;s account.</p>
  612. <p>&#8220;This creates a cascading effect where an infected package leads to compromised maintainer credentials, which in turn infects all other packages maintained by that user,&#8221; StepSecurity&#8217;s <strong>Ashish Kurmi</strong> wrote.</p>
  613. <p>Eriksen said Shai-Hulud is still propagating, although its spread seems to have waned in recent hours.</p>
  614. <p>&#8220;I still see package versions popping up once in a while, but no new packages have been compromised in the last ~6 hours,&#8221; Eriksen said. &#8220;But that could change now as the east coast starts working. I would think of this attack as a &#8216;living&#8217; thing almost, like a virus. Because it can lay dormant for a while, and if just one person is suddenly infected by accident, they could restart the spread. Especially if there&#8217;s a super-spreader attack.&#8221;</p>
  615. <p>For now, it appears that the web address the attackers were using to exfiltrate collected data was disabled due to rate limits, Eriksen said.</p>
  616. <p><strong>Nicholas Weaver</strong> is a researcher with the <strong>International Computer Science Institute</strong>, a nonprofit in Berkeley, Calif. Weaver called the Shai-Hulud worm &#8220;a supply chain attack that conducts a supply chain attack.&#8221; Weaver said NPM (and all other similar package repositories) need to immediately switch to a publication model that requires explicit human consent for every publication request using a phish-proof 2FA method.</p>
  617. <p>&#8220;Anything less means attacks like this are going to continue and become far more common, but switching to a 2FA method would effectively throttle these attacks before they can spread,&#8221; Weaver said. &#8220;Allowing purely automated processes to update the published packages is now a proven recipe for disaster.&#8221;</p>
  618. ]]></content:encoded>
  619. <wfw:commentRss>https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/feed/</wfw:commentRss>
  620. <slash:comments>36</slash:comments>
  621. </item>
  622. <item>
  623. <title>Bulletproof Host Stark Industries Evades EU Sanctions</title>
  624. <link>https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-sanctions/</link>
  625. <comments>https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-sanctions/#comments</comments>
  626. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  627. <pubDate>Thu, 11 Sep 2025 17:40:22 +0000</pubDate>
  628. <category><![CDATA[A Little Sunshine]]></category>
  629. <category><![CDATA[Latest Warnings]]></category>
  630. <category><![CDATA[Ne'er-Do-Well News]]></category>
  631. <category><![CDATA[Russia's War on Ukraine]]></category>
  632. <category><![CDATA[Andrey Nesterenko]]></category>
  633. <category><![CDATA[AS209847]]></category>
  634. <category><![CDATA[domaintools]]></category>
  635. <category><![CDATA[Ivan Neculiti]]></category>
  636. <category><![CDATA[MIRhosting]]></category>
  637. <category><![CDATA[Misfits Media]]></category>
  638. <category><![CDATA[PQ Hosting]]></category>
  639. <category><![CDATA[PQ Hosting Plus S.R.L.]]></category>
  640. <category><![CDATA[Recorded Future]]></category>
  641. <category><![CDATA[Stark Industries Solutions Ltd]]></category>
  642. <category><![CDATA[WorkTitans B.V.]]></category>
  643. <category><![CDATA[WT Hosting]]></category>
  644. <category><![CDATA[Youssef Zinad]]></category>
  645. <category><![CDATA[Yuri Neculiti]]></category>
  646. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72088</guid>
  647.  
  648. <description><![CDATA[In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new data shows those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other corporate entities controlled by its original hosting providers.]]></description>
  649. <content:encoded><![CDATA[<p>In May 2025, the European Union levied financial sanctions on the owners of<strong> Stark Industries Solutions Ltd.</strong>, a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new findings show those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other corporate entities controlled by its original hosting providers.</p>
  650. <div id="attachment_58061" style="width: 751px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-58061" decoding="async" loading="lazy" class="wp-image-58061" src="https://krebsonsecurity.com/wp-content/uploads/2022/01/wbrkb.jpg" alt="" width="741" height="495" /><p id="caption-attachment-58061" class="wp-caption-text">Image: Shutterstock.</p></div>
  651. <p>Materializing just two weeks before Russia invaded Ukraine in 2022, Stark Industries Solutions became a frequent source of massive DDoS attacks, Russian-language proxy and VPN services, malware tied to Russia-backed hacking groups, and fake news. ISPs like Stark are called &#8220;bulletproof&#8221; providers when they cultivate a reputation for ignoring any abuse complaints or police inquiries about activity on their networks.</p>
  652. <p>In May 2025, the European Union <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L_202500965" target="_blank" rel="noopener">sanctioned</a> one of Stark&#8217;s two main conduits to the larger Internet &#8212; Moldova-based <strong>PQ Hosting</strong> &#8212; as well as the company&#8217;s Moldovan owners <strong>Yuri</strong> and <strong>Ivan Neculiti</strong>. The EU Commission said the Neculiti brothers and PQ Hosting were linked to Russia&#8217;s hybrid warfare efforts.</p>
  653. <p>But <a href="https://www.recordedfuture.com/research/one-step-ahead-stark-industries-solutions-preempts-eu-sanctions" target="_blank" rel="noopener">a new report</a> from <strong>Recorded Future</strong> finds that just prior to the sanctions being announced, Stark rebranded to <strong>the[.]hosting</strong>, under control of the Dutch entity <strong>WorkTitans BV</strong> (AS209847) on June 24, 2025. The Neculiti brothers reportedly got a heads up roughly 12 days before the sanctions were announced, when Moldovan and EU media reported on the forthcoming inclusion of the Neculiti brothers in the sanctions package.</p>
  654. <p>In response, the Neculiti brothers moved much of Stark&#8217;s considerable address space and other resources over to a new company in Moldova called <strong>PQ Hosting Plus S.R.L</strong>., an entity reportedly connected to the Neculiti brothers thanks to <a href="https://correctiv.org/faktencheck/russland-ukraine/2024/05/16/hacks-und-propaganda-zwei-brueder-aus-moldau-tragen-russlands-digitalen-krieg-nach-europa/#:~:text=web%20hosting%20service%2C-,Morenehost,-%2C%20writes%20the%20IT" target="_blank" rel="noopener">the re-use of a phone number</a> from the original PQ Hosting.</p>
  655. <p>&#8220;Although the majority of associated infrastructure remains attributable to Stark Industries, these changes likely reflect an attempt to obfuscate ownership and sustain hosting services under new legal and network entities,&#8221; Recorded Future observed.</p>
  656. <p>Neither the Recorded Future report nor the May 2025 sanctions from the EU mentioned a second critical pillar of Stark&#8217;s network that KrebsOnSecurity identified in <a href="https://krebsonsecurity.com/2024/05/stark-industries-solutions-an-iron-hammer-in-the-cloud/" target="_blank" rel="noopener">a May 2024 profile on the notorious bulletproof hoster</a>: The Netherlands-based hosting provider <strong>MIRhosting</strong>.</p>
  657. <p>MIRhosting is operated by 38-year old <strong>Andrey Nesterenko</strong>, whose <a href="https://web.archive.org/web/20141221134456/http://www.nesterenko.name/en/index.html" target="_blank" rel="noopener">personal website</a> says he is an accomplished concert pianist who began performing publicly at a young age. <strong>DomainTools</strong> says mirhosting[.]com is registered to Mr. Nesterenko and to <strong>Innovation IT Solutions Corp</strong>, which lists addresses in London and in Nesterenko’s stated hometown of Nizhny Novgorod, Russia.</p>
  658. <div id="attachment_67519" style="width: 758px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-67519" decoding="async" loading="lazy" class=" wp-image-67519" src="https://krebsonsecurity.com/wp-content/uploads/2024/05/neculiti-netzwerk-768x1340-1.png" alt="" width="748" height="1305" /><p id="caption-attachment-67519" class="wp-caption-text">Image credit: correctiv.org.</p></div>
  659. <p>According to the book <em>Inside Cyber Warfare</em> by Jeffrey Carr, Innovation IT Solutions Corp. was responsible for hosting <strong>StopGeorgia[.]ru</strong>, a hacktivist website for organizing cyberattacks against Georgia that appeared at the same time Russian forces invaded the former Soviet nation in 2008. That conflict was thought to be the first war ever fought in which a notable cyberattack and an actual military engagement happened simultaneously.</p>
  660. <p>Mr. Nesterenko did not respond to requests for comment. In May 2024, Mr. Nesterenko <a href="https://krebsonsecurity.com/2024/05/stark-industries-solutions-an-iron-hammer-in-the-cloud/" target="_blank" rel="noopener">said</a> he couldn&#8217;t verify whether StopGeorgia was ever a customer because they didn&#8217;t keep records going back that far. But he maintained that Stark Industries Solutions was merely one client of many, and claimed MIRhosting had not received any actionable complaints about abuse on Stark.</p>
  661. <p>However, it appears that MIRhosting is once again the new home of Stark Industries, and that MIRhosting employees are managing both the[.]hosting and WorkTitans &#8212; the primary beneficiaries of Stark&#8217;s assets.</p>
  662. <p>A copy of the incorporation documents for WorkTitans BV obtained from the Dutch Chamber of Commerce shows WorkTitans also does business under the names <strong>Misfits Media</strong> and and <strong>WT Hosting</strong> (considering Stark&#8217;s historical connection to Russian disinformation websites, &#8220;Misfits Media&#8221; is a bit on the nose).<span id="more-72088"></span></p>
  663. <div id="attachment_72163" style="width: 663px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72163" decoding="async" loading="lazy" class=" wp-image-72163" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/kvk-worktitans.png" alt="" width="653" height="896" /><p id="caption-attachment-72163" class="wp-caption-text">An incorporation document for WorkTitans B.V. from the Netherlands Chamber of Commerce.</p></div>
  664. <p>The incorporation document says the company was formed in 2019 by a <strong>y.zinad@worktitans.nl</strong>. That email address corresponds to <a href="https://www.linkedin.com/in/youssef-zinad-mba-a1690a10/" target="_blank" rel="noopener">a LinkedIn account</a> for a <strong>Youssef Zinad</strong>, who says their personal websites are worktitans[.]nl and custom-solution[.]nl. The profile also links to a website (etripleasims dot nl) that LinkedIn currently blocks as malicious. All of these websites are or were hosted at MIRhosting.</p>
  665. <p>Although Mr. Zinad&#8217;s LinkedIn profile does not mention any employment at MIRhosting, virtually all of his LinkedIn posts over the past year have been reposts of advertisements for MIRhosting&#8217;s services.</p>
  666. <div id="attachment_72178" style="width: 760px" class="wp-caption aligncenter"><img aria-describedby="caption-attachment-72178" decoding="async" loading="lazy" class=" wp-image-72178" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/zinad-mirhosting.png" alt="" width="750" height="646" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/09/zinad-mirhosting.png 998w, https://krebsonsecurity.com/wp-content/uploads/2025/09/zinad-mirhosting-768x661.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/09/zinad-mirhosting-782x673.png 782w" sizes="(max-width: 750px) 100vw, 750px" /><p id="caption-attachment-72178" class="wp-caption-text">Mr. Zinad&#8217;s LinkedIn profile is full of posts for MIRhosting&#8217;s services.</p></div>
  667. <p>A Google search for Youssef Zinad reveals multiple startup-tracking websites that list him as the founder of the[.]hosting, which <strong>censys.io</strong> finds is hosted by <strong>PQ Hosting Plus S.R.L</strong>.</p>
  668. <p>The Dutch Chamber of Commerce document says WorkTitans&#8217; sole shareholder is a company in Almere, Netherlands called <strong>Fezzy B.V. </strong>Who runs Fezzy? The phone number listed in a Google search for Fezzy B.V. &#8212; <strong>31651079755</strong> &#8212; also was used to register a <strong>Facebook</strong> profile for a Youssef Zinad from the same town, according to the breach tracking service <strong>Constella Intelligence</strong>.</p>
  669. <p>In a series of email exchanges leading up to KrebsOnSecurity&#8217;s <a href="https://krebsonsecurity.com/2024/05/stark-industries-solutions-an-iron-hammer-in-the-cloud/" target="_blank" rel="noopener">May 2024 deep dive on Stark</a>, Mr. Nesterenko included Mr. Zinad in the message thread (youssef@mirhosting.com), referring to him as part of the company&#8217;s legal team. The Dutch website stagemarkt[.]nl lists Youssef Zinad as an official contact for MIRhosting&#8217;s offices in Almere. Mr. Zinad did not respond to requests for comment.</p>
  670. <p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-72162" src="https://krebsonsecurity.com/wp-content/uploads/2025/09/stage-mir-youssef.png" alt="" width="1173" height="810" srcset="https://krebsonsecurity.com/wp-content/uploads/2025/09/stage-mir-youssef.png 1173w, https://krebsonsecurity.com/wp-content/uploads/2025/09/stage-mir-youssef-768x530.png 768w, https://krebsonsecurity.com/wp-content/uploads/2025/09/stage-mir-youssef-782x540.png 782w, https://krebsonsecurity.com/wp-content/uploads/2025/09/stage-mir-youssef-100x70.png 100w" sizes="(max-width: 1173px) 100vw, 1173px" /></p>
  671. <p>Given the above, it is difficult to argue with the Recorded Future report on Stark&#8217;s rebranding, which concluded that &#8220;the EU’s sanctioning of Stark Industries was largely ineffective, as affiliated infrastructure remained operational and services were rapidly re-established under new branding, with no significant or lasting disruption.&#8221;</p>
  672. ]]></content:encoded>
  673. <wfw:commentRss>https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-sanctions/feed/</wfw:commentRss>
  674. <slash:comments>25</slash:comments>
  675. </item>
  676. <item>
  677. <title>Microsoft Patch Tuesday, September 2025 Edition</title>
  678. <link>https://krebsonsecurity.com/2025/09/microsoft-patch-tuesday-september-2025-edition/</link>
  679. <comments>https://krebsonsecurity.com/2025/09/microsoft-patch-tuesday-september-2025-edition/#comments</comments>
  680. <dc:creator><![CDATA[BrianKrebs]]></dc:creator>
  681. <pubDate>Tue, 09 Sep 2025 21:21:14 +0000</pubDate>
  682. <category><![CDATA[Latest Warnings]]></category>
  683. <category><![CDATA[The Coming Storm]]></category>
  684. <category><![CDATA[Time to Patch]]></category>
  685. <category><![CDATA[apple]]></category>
  686. <category><![CDATA[CVE-2025-38352]]></category>
  687. <category><![CDATA[CVE-2025-48543]]></category>
  688. <category><![CDATA[CVE-2025-54916]]></category>
  689. <category><![CDATA[CVE-2025-54918]]></category>
  690. <category><![CDATA[CVE-2025-55177]]></category>
  691. <category><![CDATA[CVE-2025-55234]]></category>
  692. <category><![CDATA[google]]></category>
  693. <category><![CDATA[Immersive]]></category>
  694. <category><![CDATA[Kev Breen]]></category>
  695. <category><![CDATA[microsoft]]></category>
  696. <category><![CDATA[NT LAN Manager]]></category>
  697. <category><![CDATA[sans internet storm center]]></category>
  698. <category><![CDATA[Satnam Narang]]></category>
  699. <category><![CDATA[Tenable]]></category>
  700. <category><![CDATA[WhatsApp]]></category>
  701. <category><![CDATA[windows]]></category>
  702. <category><![CDATA[Windows NTLM]]></category>
  703. <guid isPermaLink="false">https://krebsonsecurity.com/?p=72086</guid>
  704.  
  705. <description><![CDATA[Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no known "zero-day" or actively exploited vulnerabilities in this month's bundle from Redmond, which nevertheless includes patches for 13 flaws that earned Microsoft's most-dire "critical" label. Meanwhile, both Apple and Google recently released updates to fix zero-day bugs in their devices.]]></description>
  706. <content:encoded><![CDATA[<p><strong>Microsoft Corp.</strong> today issued security updates to fix more than 80 vulnerabilities in its <strong>Windows</strong> operating systems and software. There are no known &#8220;zero-day&#8221; or actively exploited vulnerabilities in this month&#8217;s bundle from Redmond, which nevertheless includes patches for 13 flaws that earned Microsoft&#8217;s most-dire &#8220;critical&#8221; label. Meanwhile, both <strong>Apple</strong> and <strong>Google</strong> recently released updates to fix zero-day bugs in their devices.</p>
  707. <p><img decoding="async" loading="lazy" class="aligncenter  wp-image-60331" src="https://krebsonsecurity.com/wp-content/uploads/2022/07/winupdatedate.png" alt="" width="750" height="496" srcset="https://krebsonsecurity.com/wp-content/uploads/2022/07/winupdatedate.png 923w, https://krebsonsecurity.com/wp-content/uploads/2022/07/winupdatedate-768x508.png 768w, https://krebsonsecurity.com/wp-content/uploads/2022/07/winupdatedate-782x518.png 782w" sizes="(max-width: 750px) 100vw, 750px" /></p>
  708. <p>Microsoft assigns security flaws a &#8220;critical&#8221; rating when malware or miscreants can exploit them to gain remote access to a Windows system with little or no help from users. Among the more concerning critical bugs quashed this month is <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54918" target="_blank" rel="noopener">CVE-2025-54918</a>. The problem here resides with <strong>Windows NTLM</strong>, or NT LAN Manager, a suite of code for managing authentication in a Windows network environment.</p>
  709. <p>Redmond rates this flaw as &#8220;Exploitation More Likely,&#8221; and although it is listed as a privilege escalation vulnerability, <strong>Kev Breen</strong> at <strong>Immersive</strong> says this one is actually exploitable over the network or the Internet.</p>
  710. <p>&#8220;From Microsoft’s limited description, it appears that if an attacker is able to send specially crafted packets over the network to the target device, they would have the ability to gain SYSTEM-level privileges on the target machine,&#8221; Breen said. &#8220;The patch notes for this vulnerability state that &#8216;Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network,&#8217; suggesting an attacker may already need to have access to the NTLM hash or the user&#8217;s credentials.&#8221;</p>
  711. <p>Breen said another patch &#8212; <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-55234" target="_blank" rel="noopener">CVE-2025-55234</a>, a 8.8 CVSS-scored flaw affecting the <strong>Windows SMB</strong> client for sharing files across a network &#8212; also is listed as privilege escalation bug but is likewise remotely exploitable. This vulnerability was publicly disclosed prior to this month.</p>
  712. <p>&#8220;Microsoft says that an attacker with network access would be able to perform a replay attack against a target host, which could result in the attacker gaining additional privileges, which could lead to code execution,&#8221; Breen noted.<span id="more-72086"></span></p>
  713. <p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54916" target="_blank" rel="noopener">CVE-2025-54916</a> is an &#8220;important&#8221; vulnerability in <strong>Windows NTFS</strong> &#8212; the default filesystem for all modern versions of Windows &#8212; that can lead to remote code execution. Microsoft likewise thinks we are more than likely to see exploitation of this bug soon: The last time Microsoft patched an NTFS bug was in March 2025 and it was already being exploited in the wild as a zero-day.</p>
  714. <p>&#8220;While the title of the CVE says &#8216;Remote Code Execution,&#8217; this exploit is not remotely exploitable over the network, but instead needs an attacker to either have the ability to run code on the host or to convince a user to run a file that would trigger the exploit,&#8221; Breen said. &#8220;This is commonly seen in social engineering attacks, where they send the user a file to open as an attachment or a link to a file to download and run.&#8221;</p>
  715. <p>Critical and remote code execution bugs tend to steal all the limelight, but <strong>Tenable</strong> Senior Staff Research Engineer <strong>Satnam Narang</strong> notes that nearly half of all vulnerabilities fixed by Microsoft this month are privilege escalation flaws that require an attacker to have gained access to a target system first before attempting to elevate privileges.</p>
  716. <p>&#8220;For the third time this year, Microsoft patched more elevation of privilege vulnerabilities than remote code execution flaws,&#8221; Narang observed.</p>
  717. <p>On Sept. 3, Google <a href="https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-android-flaws-in-september-update/" target="_blank" rel="noopener">fixed two flaws</a> that were detected as exploited in zero-day attacks, including CVE-2025-38352, an elevation of privilege in the Android kernel, and CVE-2025-48543, also an elevation of privilege problem in the Android Runtime component.</p>
  718. <p>Also, Apple recently patched its seventh zero-day (CVE-2025-43300) of this year. It was part of <a href="https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/" target="_blank" rel="noopener">an exploit chain</a> used along with a vulnerability in the <strong>WhatsApp </strong>(CVE-2025-55177) instant messenger to hack Apple devices. Amnesty International <a href="https://x.com/DonnchaC/status/1961444710620303653" target="_blank" rel="noopener">reports</a> that the two zero-days have been used in &#8220;an advanced spyware campaign&#8221; over the past 90 days. The issue is fixed in iOS 18.6.2, iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, and macOS Ventura 13.7.8.</p>
  719. <p>The <strong>SANS Internet Storm Center</strong> has a <a href="https://isc.sans.edu/forums/diary/Microsoft%20Patch%20Tuesday%20September%202025/32270/" target="_blank" rel="noopener">clickable breakdown</a> of each individual fix from Microsoft, indexed by severity and CVSS score. Enterprise Windows admins involved in testing patches before rolling them out should keep an eye on <a href="https://www.askwoody.com/2025/september-2025-updates-are-out/" target="_blank" rel="noopener">askwoody.com</a>, which often has the skinny on wonky updates.</p>
  720. <p>AskWoody also reminds us that we&#8217;re now just two months out from Microsoft discontinuing free security updates for Windows 10 computers. For those interested in safely extending the lifespan and usefulness of these older machines, check out <a href="https://krebsonsecurity.com/2025/08/microsoft-patch-tuesday-august-2025-edition/" target="_blank" rel="noopener">last month&#8217;s Patch Tuesday coverage</a> for a few pointers.</p>
  721. <p>As ever, please don&#8217;t neglect to back up your data (if not your entire system) at regular intervals, and feel free to sound off in the comments if you experience problems installing any of these fixes.</p>
  722. ]]></content:encoded>
  723. <wfw:commentRss>https://krebsonsecurity.com/2025/09/microsoft-patch-tuesday-september-2025-edition/feed/</wfw:commentRss>
  724. <slash:comments>5</slash:comments>
  725. </item>
  726. </channel>
  727. </rss>
  728.  
  729. <!--
  730. Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/
  731.  
  732. Object Caching 316/316 objects using memcached
  733. Page Caching using memcached (User agent is rejected)
  734. Database Caching using memcached
  735.  
  736. Served from: krebsonsecurity.com @ 2025-11-01 11:37:19 by W3 Total Cache
  737. -->

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//feeds.feedburner.com/krebsonsecurity/TEjH

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda