Visualização de leitura

19 Shades of LockBit5.0, Inside the Latest Cross-Platform Ransomware’s Newest Leaked Samples: Part 2

In the first part of our LockBit 5.0 series, where we analyzed 19 samples of the latest version of this cross-platform ransomware, we provided a comprehensive technical analysis of its ESXi variant. This report, which is the second part of a three-part series, focuses on our analysis of the Linux x64 variant of LockBit 5.0.

19 Shades of LockBit5.0, Inside the Latest Cross-Platform Ransomware’s Newest Leaked Samples: Part 1

This three-part blog series presents an analysis of 19 samples of a cross-platform LockBit 5.0 ransomware payload affecting Windows, Linux (LINUX Locker v1.06/v1.08), and ESXi (LINUX ESXi Locker v1.07) environments, highlighting how the ransomware operates, encrypts data, and interacts with targeted systems. By reverse engineering multiple samples, we identified shared components across platforms as well as operating system–specific behaviors that allow the malware to function efficiently in different environments.

Ni8mare on Automation Street: When Workflows Turn Into an Attack Path

CVE-2026-21858 (Ni8mare) is a maximum-severity vulnerability in self-hosted n8n that can enable unauthenticated instance takeover, leading to remote code execution (RCE) when public webhook or form endpoints are exposed. Because n8n commonly stores and brokers API tokens, OAuth credentials, database access, and cloud keys, a compromise can quickly become a pivot into wider enterprise infrastructure. This issue lands amid a cluster of other critical n8n disclosures (including RCE and sandbox-bypass paths), increasing overall risk. The most effective response is to apply the latest updates immediately.

Ni8mare on Automation Street: When Workflows Turn Into an Attack Path

CVE-2026-21858 (Ni8mare) is a maximum-severity vulnerability in self-hosted n8n that can enable unauthenticated instance takeover, leading to remote code execution (RCE) when public webhook or form endpoints are exposed. Because n8n commonly stores and brokers API tokens, OAuth credentials, database access, and cloud keys, a compromise can quickly become a pivot into wider enterprise infrastructure. This issue lands amid a cluster of other critical n8n disclosures (including RCE and sandbox-bypass paths), increasing overall risk. The most effective response is to apply the latest updates immediately.

SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp

LevelBlue SpiderLabs researchers have recently identified a banking Trojan we dubbed Eternidade Stealer, which is distributed through WhatsApp hijacking and social engineering lures. In this blog post, we will break down the techniques used in the campaign and highlight the new tools employed by the threat group.

The Breach Beyond the Runway: Cybercriminals Targeted Qantas Through a Trusted Partner

On July 3, 2025, Qantas confirmed in an update statement that a cyber incident had compromised data from one of its contact centers, following the detection of suspicious activity on June 30. The breach didn’t strike at the heart of Qantas’ systems; it snuck in through a third-party provider.

SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp

Trustwave SpiderLabs researchers have recently identified a banking Trojan we dubbed Eternidade Stealer, which is distributed through WhatsApp hijacking and social engineering lures. In this blog post, we will break down the techniques used in the campaign and highlight the new tools employed by the threat group.

❌