#credential-theft

[ follow ]
Information security
fromInfoQ
1 day ago

AI-Powered Bot Compromises GitHub Actions Workflows Across Microsoft, DataDog, and CNCF Projects

An autonomous AI bot exploited GitHub Actions workflows across major open-source repositories, achieving remote code execution and stealing credentials with write permissions between February 21-28, 2026.
#supply-chain-attack
Information security
fromThe Hacker News
1 day ago

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

UNC6426 exploited stolen GitHub tokens from the nx npm supply chain compromise to completely breach a victim's cloud environment and exfiltrate data within 72 hours.
fromTheregister
3 months ago
Information security

PostHog admits Shai-Hulud 2.0 was its biggest security scare

A malicious worm was inserted into popular PostHog JavaScript SDKs, stole developer and cloud credentials, and propagated by using exfiltrated tokens to publish further compromised packages.
fromInfoWorld
4 months ago
Information security

Self-propagating worm found in marketplaces for Visual Studio Code extensions

GlassWorm infects VS Code and OpenVSX extensions, harvesting developer credentials, deploying proxies and backdoors, draining crypto wallets, and spreading rapidly.
Information security
fromThe Hacker News
1 day ago

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

UNC6426 exploited stolen GitHub tokens from the nx npm supply chain compromise to completely breach a victim's cloud environment and exfiltrate data within 72 hours.
Information security
fromThe Hacker News
1 day ago

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Five malicious Rust crates disguised as time utilities steal .env files containing API keys and secrets, exfiltrating data to threat actor infrastructure.
Information security
fromThe Hacker News
2 days ago

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Threat actors exploit FortiGate firewall vulnerabilities and weak credentials to access configuration files containing service account credentials and network topology information, targeting healthcare, government, and managed service providers.
Information security
fromTheregister
2 days ago

Crooks compromise WordPress sites, spread infostealers

Attackers compromised legitimate WordPress sites including a US Senate candidate's website to distribute infostealer malware through fake Cloudflare CAPTCHA pages that trick users into running malicious commands.
Information security
fromSecurityWeek
3 days ago

ClickFix Attack Uses Windows Terminal to Evade Detection

A new ClickFix attack variant bypasses Run dialog protections by instructing victims to use Windows Terminal for executing malicious PowerShell commands that lead to Lumma Stealer infections.
fromPCWorld
6 days ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Information security
fromTheregister
6 days ago

Microsoft spots ClickFix scam spreading Lumma infostealer

A new ClickFix scam variant tricks Windows users into pasting malware commands into Windows Terminal, deploying the Lumma credential-stealing infostealer to compromise browser vaults.
Information security
fromTheregister
1 week ago

Malware-laced OpenClaw installers get Bing AI search boost

Scammers exploited OpenClaw's popularity by creating fake installers on GitHub that appeared in Bing AI search results, distributing information stealers and malware to unsuspecting users.
#phishing-as-a-service
fromSecurityWeek
1 week ago
Privacy technologies

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
fromThe Hacker News
3 months ago
Information security

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

Sneaky 2FA PhaaS now uses Browser-in-the-Browser (BitB) to present fake Microsoft login pop-ups, enabling large-scale credential theft and account takeover.
Privacy technologies
fromSecurityWeek
1 week ago

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
#phishing
Privacy technologies
fromTechzine Global
1 week ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromZDNET
1 month ago
Information security

1Password's new anti-phishing feature targets your most inescapable vulnerability - here's how

Information security
fromThe Hacker News
1 month ago

Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

Attackers use stolen credentials and legitimate RMM software to create persistent, stealthy backdoors by phishing for logins and deploying signed binaries.
Information security
fromThe Hacker News
1 month ago

LastPass Warns of Fake Maintenance Messages Targeting Users' Master Passwords

A phishing campaign impersonating LastPass seeks users' master passwords via urgent backup emails and malicious redirecting sites.
Privacy technologies
fromTechzine Global
1 week ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromZDNET
1 month ago
Information security

1Password's new anti-phishing feature targets your most inescapable vulnerability - here's how

Information security
fromTheregister
2 weeks ago

Scattered Lapsus$ Hunters seeks women to defraud helpdesks

Scattered Lapsus$ Hunters recruits women for social engineering attacks against IT helpdesks, offering $500-$1,000 per successful call to exploit gender bias in security training.
Information security
fromSecurityWeek
2 weeks ago

The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI

Over half of tracked vulnerabilities require no authentication, while AI amplifies attacker capabilities and supply chain breaches surge fourfold, creating expanding security risks.
Information security
fromTravel + Leisure
2 weeks ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
fromSecurityWeek
2 weeks ago

Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS

Over 600 Fortinet FortiGate firewall instances have been hacked in an AI-powered campaign that exploits exposed ports and weak credentials, AWS reports. The attacks, observed between January 11 and February 18, did not target known vulnerabilities. Instead, they focused on the exploitation of exposed device configurations across globally dispersed appliances. According to AWS, the campaign was carried out by an unsophisticated threat actor that relied on multiple commercial gen-AI services to implement known attack techniques.
Information security
Information security
fromDataBreaches.Net
2 weeks ago

A single compromised account gave hackers access to 1.2 million French banking records - DataBreaches.Net

Stolen credentials from one government official allowed attackers to access France's FICOBA database, exposing over 1.2 million bank accounts and sensitive financial data.
Information security
fromThe Hacker News
3 weeks ago

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Massiv is an Android trojan that enables device takeover and credential theft via overlays, screen streaming, keylogging, SMS interception, and remote control for financial fraud.
fromComputerworld
3 weeks ago

Exploit available for new Chrome zero-day vulnerability, says Google

Gene Moody, field CTO at Action1, explained that, in this vulnerability, a browser frees an object, but later continues to use the stale reference memory location. Any attacker who can shape heap layout with controlled content can potentially replace the contents of that freed memory with data they control. Because this lives in the renderer, and is reachable through normal page content, he said, the trigger surface is almost absolute.
Information security
Information security
fromTechRepublic
3 weeks ago

Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware

Fake CAPTCHA pages trick Windows users into running malicious PowerShell that deploys StealC malware to steal credentials, wallets, and system data.
#android-malware
Information security
fromTheregister
4 weeks ago

Supply chain breaches fuel cybercrime cycle, report says

Cybercriminals are industrializing supply chain attacks into a self-reinforcing ecosystem combining package compromise, credential theft, identity attacks, and ransomware.
Information security
fromTechzine Global
4 weeks ago

Lumma Stealer back despite previous police action

Lumma Stealer infections are increasing, using ClickFix social-engineering and memory-only CastleLoader to deploy credential-stealing malware that exfiltrates passwords, wallets, and system data.
Information security
fromThe Hacker News
4 weeks ago

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

A malicious Outlook add-in hijacked an abandoned add-in's domain, served a fake Microsoft login, and stole over 4,000 credentials in a supply chain takeover.
fromThe Hacker News
4 weeks ago

From Ransomware to Residency: Inside the Rise of the Digital Parasite

To be clear, ransomware isn't going anywhere, and adversaries continue to innovate. But the data shows a clear strategic pivot away from loud, destructive attacks toward techniques designed to evade detection, persist inside environments, and quietly exploit identity and trusted infrastructure. Rather than breaking in and burning systems down, today's attackers increasingly behave like Digital Parasites. They live inside the host, feed on credentials and services, and remain undetected for as long as possible.
Information security
Information security
fromInc
1 month ago

Platforms Can't Stop Live Pirates with Yesterday's Tools

Real-time fraudulent live streams impersonate brands and executives to steal credentials and money, exploiting platforms' inadequate live-moderation and causing rapid financial and reputational harm.
Information security
fromThe Hacker News
1 month ago

Mandiant Finds ShinyHunters Using Vishing to Steal MFA and Breach SaaS Platforms

ShinyHunters-linked actors use vishing and fraudulent credential sites to steal SSO and MFA credentials, access cloud SaaS data, and escalate extortion tactics.
Information security
fromInfoWorld
1 month ago

Crooks are hijacking and reselling AI infrastructure: Report

Threat actors are probing and hijacking exposed corporate LLM and MCP endpoints to steal compute, exfiltrate data, and resell API access for profit.
Information security
fromTheregister
1 month ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Information security
fromTheregister
1 month ago

Phishing attacks abuse SharePoint, target energy orgs

Attackers used SharePoint-based phishing to steal credentials, compromise energy-sector email accounts, and send hundreds of phishing messages from hijacked inboxes.
Information security
fromTechzine Global
1 month ago

Skeleton Key campaign exploits trusted RMM tools

Attackers hijack legitimate remote monitoring and management (RMM) tools, using stolen credentials and signed enterprise software to maintain stealthy persistent backdoors.
Information security
fromTheregister
1 month ago

Mandiant releases credential cracker, to kill bad protocol

Mandiant released rainbow tables that enable Net-NTLMv1 credentials to be cracked within 12 hours on consumer hardware, urging organizations to disable the legacy protocol.
fromArs Technica
1 month ago

Mandiant releases rainbow table that cracks weak admin password in 12 hours

Microsoft released NTLMv1 in the 1980s with the release of OS/2. In 1999, cryptanalyst Bruce Schneier and Mudge published research that exposed key weaknesses in the NTLMv1 underpinnings. At the 2012 Defcon 20 conference, researchers released a tool set that allowed attackers to move from untrusted network guest to admin in 60 seconds, by attacking the underlying weakness. With the 1998 release of Windows NT SP4 in 1998, Microsoft introduced NTLMv2, which fixed the weakness.
Information security
fromTechCrunch
1 month ago

Supreme Court hacker posted stolen government data on Instagram | TechCrunch

Moore accessed those systems using stolen credentials of users who were authorized to access them. Once he gained access to those victims' accounts, Moore accessed and stole their personal data and posted some online to his Instagram account: @ihackthegovernment. In the case of the Supreme Court victim, identified as GS, Moore posted their name and "current and past electronic filing records."
Information security
Information security
fromTheregister
2 months ago

North Korea turns QR codes into phishing weapons

North Korean-linked hackers use malicious QR codes (quishing) to steal credentials and session tokens, bypass multi-factor authentication, and maintain access to targeted organizations.
#npm
fromInfoQ
4 months ago
Information security

NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks

fromInfoQ
4 months ago
Information security

NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks

Information security
fromThe Hacker News
2 months ago

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Two malicious Google Chrome extensions named 'Phantom Shuttle' intercept traffic, inject credentials, act as MITM proxies, and exfiltrate data after paid subscriptions.
#npm-supply-chain
fromIT Pro
3 months ago
Information security

Shai-Hulud malware is back with a vengeance and hit more than 19,000 GitHub repositories so far - here's what developers need to know

fromIT Pro
3 months ago
Information security

Shai-Hulud malware is back with a vengeance and hit more than 19,000 GitHub repositories so far - here's what developers need to know

Information security
fromTheregister
2 months ago

China's Ink Dragon hides out in European government networks

Ink Dragon expanded espionage into European government networks, using compromised servers as relay nodes, stealing credentials and updating backdoors to blend with Microsoft cloud activity.
Information security
fromTheregister
2 months ago

SantaStealer bags credentials and crypto wallets

SantaStealer is a modular credential- and wallet-stealing infostealer advertised as undetectable despite samples lacking robust anti-analysis and evasion techniques.
#infostealer
Information security
fromThe Hacker News
2 months ago

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Four new phishing kits — BlackForce, GhostFrame, InboxPrime AI, and Spiderman — enable large-scale credential theft and MFA bypass using MitB and evasion techniques.
Information security
fromAbove the Law
2 months ago

Incident Response Has Become A Law Firm Survival Skill - Above the Law

Law firms face targeted cyberattacks; preparedness and practiced incident response, clear leadership, and fast decisions prevent compounded damage and regulatory, ethical, and malpractice risks.
Information security
fromIT Pro
3 months ago

The most prominent infostealers and how businesses can protect against them

Infostealers increasingly harvest credentials that enable major breaches and ransomware, with strains like Stealerium and Lumma driving widespread, adaptable, multi-vector attacks.
#software-supply-chain
#supply-chain
fromInfoWorld
6 months ago
Information security

Wave of npm supply chain attacks exposes thousands of enterprise developer credentials

fromInfoWorld
6 months ago
Information security

Wave of npm supply chain attacks exposes thousands of enterprise developer credentials

Information security
fromsfist.com
3 months ago

Anthropic Says Its AI Chatbot Was Used By Chinese Hackers for Large-Scale Cyber Attack

Anthropic's Claude chatbot was used by state-sponsored Chinese hackers to automate large-scale cyberattacks against about 30 American companies.
Information security
fromZDNET
4 months ago

Google spots malware in the wild that morphs mid-attack, thanks to AI

AI-powered large language models are being used in active cyberattacks to create adaptive malware that dynamically rewrites code, steals credentials, and evades detection.
fromThe Hacker News
5 months ago

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine optimization (SEO) fraud and theft of high-value credentials, configuration files, and certificate data. The attacks are designed to target Microsoft Internet Information Services (IIS) servers, with most of the infections reported in India, Thailand, Vietnam, Canada, and Brazil, spanning universities, tech firms, and telecom providers. The group was first discovered in April 2025. The targets are primarily mobile users, encompassing both Android and Apple iPhone devices.
Information security
Information security
fromTheregister
5 months ago

US government fibbing over FEMA security failings?

A June breach of FEMA via stolen credentials and a Citrix vulnerability led to Region 6 data exfiltration, prompting leadership firings and an IT overhaul despite initial claims of no data loss.
Information security
fromDataBreaches.Net
5 months ago

PowerSchool hit by Salesloft Drift campaign, but hackers claim that there is no risk of harm or ransom - DataBreaches.Net

PowerSchool's Salesforce customer-support database was accessed via the Drift app breach, exposing customer contact information, support case metadata, and support case contents.
Information security
fromTheregister
5 months ago

Beijing-backed burglars target government web servers

China-backed Phantom Taurus uses novel .NET-based NET-STAR malware to target IIS servers and pursue military, diplomatic, and government intelligence across Asia, Middle East, Africa.
fromSecurityWeek
5 months ago

PyPI Warns Users of Fresh Phishing Campaign

The attack, a continuation of a campaign conducted in July, involves fraudulent messages asking users to verify their email address for security purposes, and claiming that accounts may be suspended due to lack of action. "This email is fake, and the link goes to pypi-mirror.org which is a domain not owned by PyPI or the PSF [Python Software Foundation]," PSF security developer-in-residence Seth Larson warns. Setting up phishing-resistant multi-factor authentication (MFA), Larson explains, helps PyPI maintainers mitigate the risks associated with phishing attacks.
Information security
fromInfoWorld
5 months ago

QR codes become the vehicle for malware in new technique

The malicious package, fezbox, is disguised as a utility library and has "layers of obfuscation" including the "innovative, steganographic use" of QR codes. Steganography involves embedding secret data into a cover medium so that it goes undetected. "Steganography is the practice of hiding a secret file in plain sight, something for which QR codes are great," wrote Socket researcher Olivia Brown.
Information security
fromComputerWeekly.com
5 months ago

Microsoft scores win against Office 365 credential thieves | Computer Weekly

Investigators from Microsoft's Digital Crimes Unit (DCU) have disrupted the network behind the dangerous RaccoonO365 infostealer malware that targeted the usernames and credentials of Office 365 users after being granted a court order in the Southern District of New York. The operation saw a total of 338 websites linked to the popular malware seized and its technical infrastructure disrupted, severing RaccoonO365 users' access to their victims.
Information security
Information security
fromThe Cyber Express
5 months ago

New Infostealer Campaign Targets Popular Games

Maranhão Stealer spreads via cracked-software sites to steal browser credentials and cryptocurrency data using Node.js payloads, reflective DLL injection, persistence mechanisms, and system reconnaissance.
fromThe Hacker News
6 months ago

When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider

As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In fact, over 80% of security incidents now originate from web applications accessed via Chrome, Edge, Firefox, and other browsers. One particularly fast-evolving adversary, Scattered Spider, has made it their mission to wreak havoc on enterprises by specifically targeting sensitive data on these browsers.
Information security
fromIT Pro
6 months ago

Watch out for fake Zoom invites - hackers are abusing ConnectWise ScreenConnect to take over devices

To manipulate targets into engaging and downloading ScreenConnect, the attackers employ advanced deception techniques built around impressive impersonations and familiar business contexts, effectively creating workflows that align with end-user expectations,
Information security
#identity-security
fromIT Pro
6 months ago
Information security

Cyber teams are struggling to keep up with a torrent of security alerts

fromIT Pro
6 months ago
Information security

Cyber teams are struggling to keep up with a torrent of security alerts

Information security
fromThe Hacker News
6 months ago

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

ShadowCaptcha uses compromised WordPress sites and fake CAPTCHA pages with ClickFix social engineering to deliver stealers, ransomware, and cryptocurrency miners.
Information security
fromThe Hacker News
6 months ago

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

HOOK Android banking trojan variant adds ransomware-style full-screen overlays, expanded remote commands, and enhanced data theft and device takeover capabilities.
fromThe Hacker News
6 months ago

DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft

Popular password manager plugins for web browsers have been found susceptible to clickjacking security vulnerabilities that could be exploited to steal account credentials, two-factor authentication (2FA) codes, and credit card details under certain conditions. The technique has been dubbed Document Object Model ( DOM)-based extension clickjacking by independent security researcher Marek Tóth, who presented the findings at the DEF CON 33 security conference earlier this month.
Information security
fromArs Technica
7 months ago

Phishers have found a way to downgrade-not bypass-FIDO MFA

The phishing attack bypasses a multifactor authentication scheme based on FIDO, the standard considered immune to credential phishing attacks, leading to unauthorized access.
Privacy technologies
#cybersecurity
fromThe Hacker News
8 months ago

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

"The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server," Ganachari said.
Growth hacking
[ Load more ]