DJBSEC's CyberNews 2025-07-08

1. Trojan Versions of PuTTY and WinSCP Spread Malware

Researchers have discovered trojanized versions of PuTTY and WinSCP being distributed to deliver malware. These fake installers appear legitimate but install backdoors that allow attackers to steal credentials and gain remote access. The malicious software is being shared on phishing sites and compromised forums targeting IT professionals. Users are urged to download such tools only from official vendor websites to avoid infection.

Read more


2. Alleged Chinese Hacker Tied to Silk Typhoon Arrested

An alleged Chinese hacker linked to the Silk Typhoon cyberespionage group has been arrested for targeting US and global networks. The individual is accused of conducting operations to steal intellectual property and sensitive government data. Authorities say the arrest is a significant win against Chinese state-sponsored cyber activities. This comes amid growing efforts to curb nation-state cyber threats worldwide.

Read more


3. Microsoft Testing Windows Update Notifications for Vulnerabilities

Microsoft is testing a new feature in Windows Update that will notify users about critical security vulnerabilities affecting their systems. The notifications will appear in the Windows Update interface and prompt users to install necessary patches immediately. This aims to improve patch adoption rates and reduce exposure to known exploits. The feature is currently in preview for Windows Insider builds.

Read more


4. Phishing Platforms and Infostealers Drive Credential Theft Surge

Security experts report that phishing-as-a-service platforms and infostealer malware are driving a surge in stolen credentials being sold online. These tools make it easier for low-skilled attackers to launch campaigns and harvest user data at scale. Infostealers such as RedLine and Raccoon remain popular for extracting browser and application credentials. Organizations are urged to deploy multifactor authentication to reduce the impact of compromised credentials.

Read more


5. Manufacturing Security at Risk Due to Default Configurations

A new report highlights that manufacturing companies remain vulnerable to cyberattacks due to reliance on default configurations. Many operational technology systems are deployed without changing default passwords or disabling unnecessary services. Attackers exploit these weaknesses to infiltrate industrial networks and disrupt production. Experts advise manufacturers to enforce security hardening practices to mitigate these risks.

Read more


6. Fake Domains Target Amazon Prime Day Shoppers

Cybercriminals have registered numerous fake domains to exploit Amazon Prime Day shoppers with phishing scams. These websites mimic Amazon’s branding to steal login credentials and payment information. Researchers warn that such campaigns spike around major online shopping events. Users are urged to navigate directly to official Amazon URLs and avoid clicking links from promotional emails.

Read more


7. PowerShell 2.0 Officially Deprecated by Microsoft

Microsoft has officially deprecated PowerShell 2.0, citing security risks and lack of modern features. The deprecated version is no longer supported, and users are urged to upgrade to PowerShell 5.1 or PowerShell 7 for improved security and functionality. Many malware strains historically exploited PowerShell 2.0’s lack of security controls. Organizations should ensure legacy scripts are updated to remain compatible with newer versions.

Read more


8. Hackers Abuse Leaked Shellter Red Team Tool for Malware Deployment

Threat actors are abusing a leaked version of Shellter, a popular red team tool, to deploy infostealer malware. Originally designed for penetration testing, Shellter enables attackers to inject malicious payloads into legitimate processes, bypassing antivirus detection. Researchers warn that the tool’s public availability increases its misuse by cybercriminals. Organizations are urged to monitor for Shellter indicators of compromise in their environments.

Read more


9. Employee Paid $920 for Credentials Used in $140 Million Bank Heist

An employee received just $920 for selling their corporate credentials, which were later used in a $140 million bank heist. Cybercriminals leveraged the access to transfer funds and launder the money through cryptocurrency exchanges. This incident highlights the severe consequences of insider threats and credential compromise. Organizations are reminded to implement strict access controls and monitor for suspicious user behavior.

Read more





Enjoy Reading This Article?

Here are some more articles you might like to read next:

  • DJBSEC's CyberNews 2025-07-11
  • DJBSEC's CyberNews 2025-07-10
  • DJBSEC's CyberNews 2025-07-09
  • DJBSEC's CyberNews 2025-07-07
  • DJBSEC's CyberNews 2025-07-04