The Cortex Protocol

@thecortexprotocol
1 Followers
0 Following
557 Posts
🛡️ THE CORTEX PROTOCOL |
Daily cybersecurity intelligence & analysis
📺 Mission Log simulations
📚 LitRPG book series
🌐 thecortexprotocol.com

⚠️ WhatsApp STAC3150 Campaign Deploys Astaroth Banking Trojan

STAC3150 threat actor is compromising WhatsApp accounts to distribute Astaroth banking trojan via malicious links.

What's clever: they hijack legitimate accounts to abuse trust relationships—victims receive malware from known contacts. Astaroth uses fileless techniques and Living-off-the-Land binaries (LOLBins) to evade detection, making it persistent even in monitored environments. Sophos tracking shows this campaign specifically targets financial data and credentials across Latin America. The social engineering vector through compromised messaging apps bypasses most email security controls.

Source: Sophos

⚠️ DeepSeek Code Flaws Linked to Real-World Attacks and Exploitation

CrowdStrike reports security flaws in code generated by DeepSeek AI are being exploited in active attacks.

⚠️ DeepSeek Code Flaws Linked to Real-World Attacks and Exploitation

CrowdStrike reports security flaws in code generated by DeepSeek AI are being exploited in active attacks.

🔴 CVE-2025-52493 - PagerDuty Cloud Runbook Exposes Secrets via Client-Side DOM

Praetorian found CVE-2025-52493 during Red Team work: PagerDuty Cloud Runbook sent full cleartext API keys and service credentials to the browser, protected only by HTML password field masking.

What's wild: authenticated admins could expose all stored secrets by changing `type="password"` to `type="text"` in dev tools—no exploit needed, just DOM manipulation. Classic client-side trust failure. PagerDuty patched it by implementing write-only updates with placeholders. Perfect example of "living off the land" attacks using legitimate interfaces.

Source: Praetorian

⚠️ Salesforce Gainsight Token Abuse Enables Unauthorized Data Access

Salesforce is investigating unauthorized access via compromised Gainsight integration tokens—mirroring the SalesLoft and Drift breaches from earlier this year.

What's concerning: OAuth tokens for third-party apps grant persistent access to Salesforce data even after initial compromise is detected. The attack pattern is consistent: compromise the integration partner, pivot to Salesforce instances using legitimate API credentials. Same supply chain playbook we've seen repeatedly in SaaS ecosystems.

Source: Help Net Security

🚨 UNC2891 ATM Fraud Network Reveals Large-Scale Financial Operation

Group-IB uncovered UNC2891 operating a sophisticated ATM fraud network using CAKETAP and STEELCORGI malware.

What's brutal: they've built an entire money mule infrastructure to cash out compromised ATMs at scale. The operation involves coordinated physical and cyber components—malware infects ATM systems to dispense cash on command, while mule networks handle the withdrawals. This isn't opportunistic fraud; it's organized financial crime with military-level operational security. The group specifically targets ATMs in developing markets with weaker security controls.

Source: Infosecurity Magazine