Oneironaut

@Oneironaut@infosec.exchange
13 Followers
107 Following
1.4K Posts
GRC advocate. Cyber adjacent. Celine Dion fan
I've been working with @shadowserver btw, their scan results for #CitrixBleed2 now show far more vulnerable systems. Their scanning is independent of mine, logic is improving, more orgs will get notifications. I'm going to try getting victims for notification across too.
@_elena its really unfortunate that the journalists I would want to tag are Substack users themselves

The Dutch Public Prosecution Office have shut down their Citrix Netscaler and removed all internet access, Dutch media speculating CitrixBleed 2 exploitation.

https://www.techzine.eu/news/security/133163/dutch-department-of-justice-offline-after-citrix-vulnerability/

Justice minister David van Weel told MPs in a briefing that it appears the weakness had been used by third parties to access the department systems.

The justice ministry said the department had applied Citrix’s recommended patches, but these failed to fully eliminate the flaw. https://www.dutchnews.nl/2025/07/prosecution-department-goes-offline-due-to-software-weakness/

Dutch Department of Justice offline after Citrix vulnerability

The Department of Justice shut down all internet connections on Friday morning after a serious security threat. Analysis showed that hackers had probably

Techzine Global
#ClickFix went from virtually non-existent to the second most common attack vector blocked by #ESET, surpassed only by #phishing. This novel social engineering technique accounted for nearly 8% of all detections in H1 2025. #ESETresearch
ClickFix lures users by displaying bogus error messages followed by quick fix instructions, including copy-pasting malicious code. Running the code in the victim’s command line interpreter delivers malware such as #RATs, infostealers, and cryptominers.
Between H2 2024 and H1 2025, ESET’s detection for ClickFix, HTML/FakeCaptcha, skyrocketed by 517%. Most detections in ESET telemetry were reported from Japan (23%), Peru (6%), and Poland, Spain, and Slovakia (>5% each).
What makes #ClickFix so effective? The fake error message looks convincing; instructions are simple, yet the copied command is too technical for most users to understand. Pasting it into cmd leads to compromise with final payloads, including #DarkGate or #LummaStealer.
While #ClickFix was introduced by cybercriminals, it’s since been adopted by APT groups: Kimsuky, Lazarus; Callisto, Sednit; MuddyWater; APT36. NK-aligned actors used it to target developers, steal crypto and passwords from Metamask and #macOS Keychain.
#ClickFix uses psychological manipulation by presenting fake issues and offering quick solutions, which makes it dangerously efficient. It appears in many forms – error popups, email attachments, fake reCAPTCHAs – highlighting the need for greater vigilance online.
Read more in the #ESETThreatReport:
🔗 https://welivesecurity.com/en/eset-research/eset-threat-report-h1-2025

Threat actors are using unsolicited Microsoft Teams calls to trick corporate employees into infecting themselves with a new version (v3) of the Matanbuchus malware

https://www.morphisec.com/blog/ransomware-threat-matanbuchus-3-0-maas-levels-up/

Teams Call to Ransomware: Matanbuchus 3.0 MaaS Levels Up

Morphisec threat researchers share an in-depth analysis on Matanbuchus, a stealthy malware loader that has advanced its techniques in 2025.

Morphisec
Delta moves toward eliminating set prices in favor of AI that determines how much you personally will pay for a ticket

The airline touted a partnership with an AI-enabled revenue system as a step on the road to fully personalized ticket pricing, part of its goal to raise profit margins long-term.

Fortune
SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware

A threat actor has been deploying a previously unseen malware called OVERSTEP that modifies the boot process of fully-patched but no longer supported SonicWall Secure Mobile Access appliances.

BleepingComputer
@jackwilliambell @jimmyhoke @pluralistic this is the lottery with fewer steps
“People using AI for decision support over-rely on it, favoring the AI’s decision over the one they would make independently. …The city’s policy should be that chatbots may not be used to support such decisions, full stop,” EFF’s Jacob Hoffman-Andrews told the Voice of San Francisco.
https://thevoicesf.org/san-francisco-city-hall-solidifies-use-of-generative-ai/
San Francisco City Hall solidifies use of generative AI

San Francisco has adopted a machine learning tool to help streamline administrative work across the city’s bureaucracy, as well as guidelines for AI use, Mayor Daniel Lurie’s office announced Monday.  The move comes on the heels of the recent adoption of guidelines for the use of AI tools, work on which started two years ago […]

The Voice of San Francisco

Just a quickie from one of our @DomainTools researchers today that I know @cR0w will enjoy.

Malware in DNS - specifically, malware seen being assembled from DNS TXT records.

Not a "zomg new thing!" so much as a neat example in the wild.

#infosec #cybersecurity #DNS

https://dti.domaintools.com/malware-in-dns/

Malware in DNS - DomainTools Investigations | DTI

Because it's always DNS, we wanted to share this fun finding of malware stored across DNS TXT records.

DomainTools Investigations | DTI
×