The FBI has issued a warning regarding new HiatusRAT malware attacks targeting vulnerable web cameras and DVRs that are exposed online. The attackers primarily focus on unpatched or end-of-life IoT devices, particularly Chinese-branded Hikvision and Xiongmai models, exploiting known vulnerabilities such as CVE-2017-7921, CVE-2018-9995, CVE-2020-25078, CVE-2021-33044, and CVE-2021-36260, along with weak vendor-supplied credentials. Leveraging tools like Ingram for vulnerability scanning and Medusa for brute-forcing authentication, the actors search for devices with exposed ports, including 23, 26, 554, 2323, 567, 5523, 8080, 9530, and 56575. This campaign spans the United States, Australia, Canada, New Zealand, and the United Kingdom. The FBI recommends isolating or limiting the usage of vulnerable devices to prevent breaches or lateral movement within networks. Administrators and cybersecurity professionals are urged to report indications of compromise to the FBI. The ongoing campaign follows previous attacks involving DrayTek Vigor VPN routers, which were exploited to build covert proxy networks for command-and-control communication. Lumen researchers discovered that HiatusRAT enables further payload deployment and converts infected devices into SOCKS5 proxies for obfuscating malicious activities.xx HiatusRAT’s focus on web cameras and DVRs aligns with strategic objectives tied to Chinese state interests, as highlighted in the U.S. intelligence community's 2023 threat assessment. These attacks underscore the growing risks associated with unsecured IoT devices and highlight the need for timely patching and strong authentication practices to mitigate exploitation.
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...
A large-scale Android malware campaign known as NoVoice was discovered on Google Play, where over 50 seemingly legitimate applications were used to distribute malicious code. These...