Ethical Hacking News
The cybersecurity landscape continues to evolve at breakneck speed, with new threats and vulnerabilities emerging daily. Recent weeks have seen a proliferation of exploits targeting popular software frameworks, messaging apps, and even Windows operating systems. In this tumultuous environment, it is essential for users to stay vigilant, update their software regularly, and maintain robust security measures to protect themselves against the ever-evolving threat landscape.
Key highlights from recent developments include:
* Chinese hackers exploiting the React2Shell vulnerability
* Intel leaks revealing zero-day exploits targeted at popular messaging apps
* CISA reports highlighting the use of BRICKSTORM exploit by PRC hackers
* Silver Fox using fake Microsoft Teams installer to spread ValleyRAT malware
* Record-breaking DDoS attack linked to AISURU botnet
Stay informed about the latest cybersecurity news and trends with The Hacker News, your trusted source for exclusive updates on the ever-evolving threat landscape.
Chinese hackers are exploiting the React2Shell vulnerability to gain unauthorized access to systems running on the React framework.A new zero-day exploit, "React2Shell", has been discovered and identified as a highly sought-after vector by hackers.Intel leaks reveal a sophisticated attack vector involving ads-based malware for Predator spyware delivery.CISA reports PRC hackers using BRICKSTORM for long-term access in U.S. systems.A malicious installer masquerading as Microsoft Teams is being used to spread ValleyRAT malware in China.A record-breaking DDoS attack linked to the AISURU botnet with up to 4 million infected hosts.Critical RSC bugs in React and Next.js allow unauthenticated remote code execution.Microsoft patches a Windows LNK flaw that had gone unaddressed for years.Brazil hit by banking Trojan spread via WhatsApp worm and RelayNFC NFC relay fraud.India orders messaging apps to work only with active SIM cards to prevent fraud and misuse.
In recent weeks, the cybersecurity landscape has been marked by an alarming proliferation of exploits, vulnerabilities, and cyber threats that have left many systems and applications exposed to potential breaches. The latest salvo in this ongoing battle for digital supremacy comes from a trio of malicious actors who have begun exploiting the newly disclosed React2Shell vulnerability, which has sent shockwaves through the cybersecurity community.
React2Shell, a zero-day exploit, was first discovered by security researchers earlier this year and has since been identified as a highly sought-after vector by hackers. According to recent intelligence reports, Chinese hackers have started taking advantage of the React2Shell vulnerability to gain unauthorized access to systems running on the React framework. This development serves as a stark reminder of the importance of keeping software up-to-date and patched against known vulnerabilities.
Moreover, Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
Meanwhile, another disturbing trend has emerged in the form of intel leaks that have shed light on the existence of zero-day exploits, including those targeted at popular messaging apps. The leaked data reveals a sophisticated attack vector involving ads-based malware, which is being used to deliver the Predator spyware. This development underscores the ever-evolving nature of cyber threats and highlights the need for robust cybersecurity measures.
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
Recent reports from the Cybersecurity and Infrastructure Security Agency (CISA) have revealed that Chinese hackers have been using the BRICKSTORM exploit, a zero-day vulnerability discovered in 2022, to gain long-term access to U.S. systems. The use of this exploit highlights the persistence and cunning of state-sponsored attackers.
Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
In another disturbing development, researchers have identified a malicious installer masquerading as a genuine Microsoft Teams application. This fake installer is being used by Silver Fox to spread the ValleyRAT malware, which is designed to steal sensitive information and compromise the security of infected systems.
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
The recent record-breaking DDoS attack that hit various targets worldwide has been linked to the AISURU botnet, which is believed to have infected over 4 million hosts. The sheer scale of this botnet highlights the ongoing threat posed by decentralized networks of compromised devices.
Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
Researchers have identified multiple critical vulnerabilities in popular JavaScript frameworks such as React and Next.js. These bugs, which have been rated high-severity, allow attackers to execute arbitrary code remotely without requiring any authentication or authorization.
Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
In a surprise move, Microsoft has finally patched the Windows LNK flaw that had gone unaddressed for years. This long-overdue patching serves as a reminder of the importance of staying up-to-date with security patches and the need for proactive cybersecurity measures.
Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud
A recent outbreak of banking malware in Brazil has highlighted the growing threat of mobile-based attacks. The malware, which is being spread through WhatsApp, uses a worm to infect devices and compromise their security. This attack underscores the importance of robust cybersecurity measures for mobile applications.
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
In an effort to curb malicious activity on messaging apps, India's government has issued new guidelines requiring these services to only function with active SIM cards. This move aims to prevent fraud and misuse by blocking inactive or stolen numbers from accessing these platforms.
ShadyPanda Turns Popular Browser Extensions into Spyware
Researchers have discovered a sophisticated malware campaign that involves turning popular browser extensions into spyware. ShadyPanda, the group behind this attack, has been linked to several high-profile data breaches in recent months. This development serves as a stark reminder of the importance of regularly updating browser extensions and maintaining robust security hygiene.
Related Information:
https://www.ethicalhackingnews.com/articles/The-Cybersecurity-Landscape-A-Complex-Web-of-Threats-and-Vulnerabilities-ehn.shtml
https://thehackernews.com/2025/12/chrome-targeted-by-active-in-wild.html
Published: Thu Dec 11 04:00:58 2025 by llama3.2 3B Q4_K_M