Cyber Bites by Edwin Kwan
Cyber Bites
Cyber Bites - 27th June 2025
0:00
-11:26

Cyber Bites - 27th June 2025

  • Massive 16 Billion Credential Compilation Not a New Data Breach, Experts Clarify

  • Hackers Exploit Gmail App Passwords to Bypass Multi-Factor Authentication

  • China's Military Adopts Generative AI for Intelligence Operations

  • Hackers Compromise Over 70 Microsoft Exchange Servers with Keylogger Attacks

  • US House Bans WhatsApp on Government Devices Over Security Concerns


Massive 16 Billion Credential Compilation Not a New Data Breach, Experts Clarify

https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/

Recent reports of a "mother of all breaches" involving 16 billion credentials have sparked widespread media coverage and alarm, but cybersecurity experts are clarifying that this is not a new data breach. The massive compilation, discovered by Cybernews after being briefly exposed online, consists of previously stolen credentials gathered from years of infostealer malware attacks, past data breaches, and credential stuffing operations. The database was stored in a format commonly associated with infostealer malware, indicating it represents a compilation of existing compromised data rather than fresh breaches from specific websites or services.

The credential collection highlights the ongoing problem of infostealer malware, which has become one of the most pervasive cybersecurity threats affecting both Windows and Mac systems. These malicious programs systematically harvest stored passwords, cryptocurrency wallets, and other sensitive data from infected devices, packaging them into "logs" that are then sold on cybercrime marketplaces or distributed freely on platforms like Telegram and Discord. The sheer volume of available stolen credentials has made compromised login information one of the primary attack vectors for threat actors seeking to breach organizational networks.

While the compilation may contain credentials from millions of users, this discovery should serve as a reminder to maintain strong security practices rather than cause panic. Users are advised to scan their systems for malware before changing passwords, implement unique passwords for each account using password managers, and enable two-factor authentication through dedicated apps rather than SMS. Those concerned about their exposure can check services like Have I Been Pwned to determine if their credentials appear in known breaches, and should use this opportunity to upgrade their overall cybersecurity hygiene.


Hackers Exploit Gmail App Passwords to Bypass Multi-Factor Authentication

https://citizenlab.ca/2025/06/russian-government-linked-social-engineering-targets-app-specific-passwords/

https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia

Russian state-sponsored hackers have successfully bypassed Gmail's multi-factor authentication protections through sophisticated social engineering attacks that trick victims into creating and sharing app-specific passwords. The threat group, tracked as UNC6293 by Google's Threat Intelligence team and believed to be associated with APT29 under Russia's Foreign Intelligence Service, targeted prominent academics and critics of Russia between April and early June 2025. The attackers impersonated U.S. Department of State officials in carefully crafted phishing campaigns designed to convince recipients that sharing their app-specific passwords was necessary for accessing a secure government communication platform.

The attack methodology demonstrated exceptional patience and attention to detail, with hackers engaging in extended email exchanges to build trust before requesting the sensitive authentication credentials. In one documented case investigated by The Citizen Lab, the attackers targeted Russian information operations expert Keir Giles by inviting him to join a fictitious "MS DoS Guest Tenant" platform. The threat actors provided detailed PDF instructions explaining how to create app-specific passwords, falsely claiming this was required for secure external user access to State Department systems. By leveraging fake carbon-copied email addresses from legitimate state.gov domains and exploiting the State Department's email server configuration that accepts messages to non-existent addresses, the attackers added credibility to their deception.

Security researchers emphasize that once victims share their app-specific passwords, attackers gain full access to Gmail accounts despite active two-factor authentication protections. Google has identified two distinct campaigns using themes related to the U.S. Department of State and Ukraine-Microsoft lures, with the threat actors employing residential proxies and virtual private servers to maintain anonymity when accessing compromised accounts. To protect against such advanced attacks, Google recommends high-profile individuals enroll in its Advanced Protection Program, which prevents the creation of app-specific passwords and requires additional security measures including passkey authentication for account access.


China's Military Adopts Generative AI for Intelligence Operations

https://www.recordedfuture.com/research/artificial-eyes-generative-ai-chinas-military-intelligence

China's People's Liberation Army has demonstrated clear interest in leveraging generative artificial intelligence to enhance military intelligence capabilities, according to a new report from Recorded Future's Insikt Group. The PLA has designed specialized systems that apply generative AI to intelligence tasks and has likely procured AI technology for intelligence purposes, with both military and defense industry entities adapting foreign and domestic large language models to develop specialized tools for intelligence work. These AI-powered systems can reportedly process and analyze intelligence data, generate intelligence products, provide recommendations, facilitate early warning capabilities, and support military decision-making while aiming to improve the speed, efficiency, and scale of intelligence operations.

The PLA's approach to generative AI integration reveals a sophisticated understanding of both the technology's potential and its limitations. Patent applications filed by PLA researchers detail methods for using generative AI in open-source intelligence collection, satellite imagery processing, and event data analysis, with one December 2024 patent proposing the use of multiple intelligence disciplines to train specialized military language models. The military has likely adopted models from various sources, including foreign platforms like Meta's Llama and OpenAI, alongside domestic alternatives from DeepSeek, Tsinghua University, and Alibaba Cloud. Researchers affiliated with the Academy of Military Science have expressed particular optimism about AI's transformative potential for intelligence research while acknowledging serious challenges including hallucination issues and reliability concerns.

The report highlights significant strategic implications for both China and Western nations as the PLA integrates generative AI into intelligence workflows. Chinese military researchers have recognized counterintelligence risks, warning that foreign adversaries could exploit deepfake technology and AI-generated disinformation to mislead Chinese intelligence personnel, while simultaneously creating similar capabilities that could be used to deceive Western analysts. The extent of successful AI integration remains unclear, as the PLA must navigate challenges including ideological bias in AI training data, the need for specialized military-focused models, and the requirement to maintain human oversight to prevent inaccurate intelligence from degrading decision-making quality in critical military operations.


Hackers Compromise Over 70 Microsoft Exchange Servers with Keylogger Attacks

https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/exchange-mutations-malicious-code-in-outlook-pages

Unidentified threat actors have been targeting publicly exposed Microsoft Exchange servers by injecting malicious JavaScript keyloggers into Outlook login pages to harvest user credentials, according to new research from Positive Technologies. The campaign has compromised 65 victims across 26 countries worldwide, representing a significant expansion of attacks first documented in May 2024 that initially focused on entities in Africa and the Middle East. The cybersecurity firm identified two distinct keylogger variants embedded in the authentication pages, with some storing collected data in locally accessible files while others immediately transmit stolen credentials to external servers controlled by the attackers.

The attack methodology exploits known vulnerabilities in Microsoft Exchange Server, including the ProxyShell and ProxyLogon vulnerability chains dating back to 2021, as well as older flaws such as CVE-2014-4078 and the Windows SMBv3 remote code execution vulnerability. The malicious JavaScript code intercepts authentication form data and either saves it to server files accessible from external networks or exfiltrates information through sophisticated channels including Telegram bots and DNS tunneling techniques. This approach provides attackers with a significant operational advantage as the locally stored variant generates no suspicious outbound traffic, making detection extremely difficult for security monitoring systems.

Government organizations represent the primary target demographic with 22 compromised servers identified, followed by attacks on IT companies, industrial organizations, and logistics firms. The geographic distribution spans Vietnam, Russia, Taiwan, China, Pakistan, Lebanon, Australia, Zambia, the Netherlands, and Turkey among the most heavily targeted nations.


US House Bans WhatsApp on Government Devices Over Security Concerns

https://www.axios.com/2025/06/23/whatsapp-house-congress-staffers-messaging-app

The U.S. House of Representatives has prohibited congressional staff from installing or using WhatsApp on government-issued devices, classifying the messaging platform as a "high-risk" communication tool. The ban, which covers mobile phones, laptops, desktop computers, and web browsers on those devices, was announced through an internal email from the House's Chief Administrative Officer Catherine Szpindor to congressional staff. While staff members can still use WhatsApp on personal devices, existing policies already restrict personal devices in sensitive areas such as classified briefings and secure facilities.

The decision reflects broader efforts by the House to limit potentially risky technology platforms, following similar restrictions on ByteDance apps like TikTok and AI tools like ChatGPT, which is only permitted in a special government version. Szpindor emphasized that protecting the House and its data remains the top priority, with the office regularly reviewing and updating approved applications based on cybersecurity risks. The CAO recommended several alternatives including Microsoft Teams, Wickr, Signal, iMessage, and FaceTime as acceptable substitutes for official communications.

WhatsApp strongly disputed the characterization, with a spokesperson stating that messages on the platform are end-to-end encrypted by default, providing higher security than most apps on the approved list that lack such protection. The company noted that members and staff regularly use WhatsApp and expressed hope that House members could officially join their Senate counterparts in using the platform. The ban comes amid growing concerns about data privacy, particularly following WhatsApp's recent announcement of introducing ads and promoted content in the Updates tab, which will use location, language, and interaction behavior data for targeted advertising.

Discussion about this episode

User's avatar