Cyber Dispatch™️
307 subscribers
17 photos
1 video
37 links
The definitive source for critical cybersecurity news. When a major threat breaks, we dispatch.

#CyberDispatch #CyberSecurity #InfoSec #ThreatIntelligence #ZeroDay #DataBreach #SecurityNews
Download Telegram
Hezbollah hack into surveillance cameras in bid to target Israeli officials

A report from Haaretz alleges that Hezbollah-linked hackers have attempted to infiltrate Israeli surveillance camera systems in an effort to monitor and potentially target senior Israeli officials. Israel’s National Cyber Directorate said the activity formed part of a wider campaign to exploit existing surveillance infrastructure for intelligence purposes, focusing on accessing live feeds from both private and public cameras.
Jury finds Instagram and YouTube liable in landmark social media addiction trial — AP
Global Disruption on X Network.
Grok and X (Twitter), which were down in several regions, are now coming back online and service is gradually being restored.
According to the Financial Times, conflict with Iran may, unlike recent wars, lead to widespread and decentralized cyber attacks.
Financial Times: An attack on Iran has triggered a cyber storm. In the early days of the Ukraine war, hackers were mostly motivated by financial gain, and cyberattacks decreased after a short period. In contrast, the Iran war involves hackers with high technical capabilities.
Pavel Durov: Iranian accounts will not be deleted
 
The owner of Telegram said that due to the outbreak of war and widespread internet outages in Iran, the deletion of accounts after a certain period of inactivity will not apply to Iranian users.
Malicious LiteLLM versions 1.82.7–1.82.8 deploy credential theft, Kubernetes lateral movement, and a persistent backdoor.

Linked to the Trivy CI/CD compromise, the payload runs on import or via .pth at Python startup, spreads across nodes, and installs a systemd service.
GlassWorm now delivers a multi-stage malware chain via malicious packages and hijacked accounts.

It hides C2 in Solana memos, installs a fake Google Docs Chrome extension, and steals cookies, sessions, and crypto wallet data, with added hardware wallet phishing.
A hacker used an AI agent to run cyber ops, with 80–90% handled autonomously.

Compromise an AI agent already inside your environment, and the kill chain disappears. It already has access, permissions, and normal data flows—so activity looks legitimate.
A new Magento skimmer uses WebRTC data channels instead of HTTP to steal payment data.

It pulls payloads and exfiltrates card details over encrypted UDP, bypassing CSP and staying invisible to most monitoring tools.

Attacks are exploiting the PolyShell RCE flaw at scale.
Coruna turns a 2023 #iOS espionage exploit into a broader attack kit.

Kaspersky confirms it reuses and evolves the Triangulation kernel exploit, now updated for newer chips and iOS versions and still actively maintained.

Now bundled into 23 exploits across 5 chains and used beyond targeted ops, it shows #iPhone exploitation is scaling.
🔥1
Security Manager Warning: Critical Infrastructures Are Direct Targets of Cyber Attacks

According to Izum magazine, Dave Dault, former CEO of FireEye and McAfee, warned that attackers' use of artificial intelligence has greatly widened the gap between offensive and defensive cyber capabilities, and the world has entered a "dark age" of cybersecurity.
Hezbollah's cyber unit hacked into surveillance cameras to target Israeli regime.

@TheGhostITM
Anonymous collective has hacked a company in Israel that provides consulting services to organizations.

@TheGhostITM
1
Handala has leaked sensitive data on 28 American military engineers currently operating in Israel.

@TheGhostITM
Handala hacking group breach of the FBI is “coming soon”; FBI director's information has been compromised.

@TheGhostITM
Hacker group Handala breached FBI Director Kash Patel’s account after the US seized its domains and put a $10M bounty on its leaders. The group is now threatening more attacks, mocking FBI cybersecurity, and sharing alleged data.

@TheGhostITM
TeamPCP escalates supply chain attacks, now poisoning Telnyx (US comms provider) PyPI library.

@TheGhostITM
ᴛʜᴇ ɢʜᴏꜱᴛ ɪɴ ᴛʜᴇ ᴍᴀᴄʜɪɴᴇ
Hacker group Handala breached FBI Director Kash Patel’s account after the US seized its domains and put a $10M bounty on its leaders. The group is now threatening more attacks, mocking FBI cybersecurity, and sharing alleged data. @TheGhostITM
קבוצת ההאקטיביסטים הבינלאומית של חמאס "הנדאלה" פרצה לחשבון מנהל ה-FBI קאש פאטל, לאחר שהאמריקאים תפסו את דומיינים שלה והציבו ראש פרוע של 10 מיליון דולר על ראש מנהיגיה. הקבוצה מאיימת על מתקפות נוספות, לועגת לאבטחת הסייבר של ה-FBI ומפרסמת נתונים שהיא טוענת כי גנבה.

@TheGhostITM
Cyberattack on the European Commission; Hackers publish data without ransom demands.

In an advanced cyberattack, the European Commission's cloud infrastructure was breached, and more than 350 gigabytes of data, including sensitive information and databases, were extracted.