China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

THN Daily Updates
Newsletter
cover

Mastering Embedded Linux Development: Craft fast and reliable embedded solutions with Linux 6.6 and The Yocto Project 5.0 (Scarthgap) , Fourth Edition ($39.99 Value) FREE for a Limited Time

Mastering Embedded Linux Development is designed to be both a learning resource and a reference for your embedded Linux projects.

Download Now Sponsored
LATEST NEWS Jul 19, 2025

China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that's used by law enforcement authorities in China to gather information from seized mobile devices. The hacking tool, believed to ...

Read More
Twitter Facebook LinkedIn

UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns

Multiple sectors in China, Hong Kong, and Pakistan have become the target of a threat activity cluster tracked as UNG0002 (aka Unknown Group 0002) as part of a broader cyber espionage campaign. "This threat entity demon...

Read More
Twitter Facebook LinkedIn

Remote Network Monitoring for IT Consultants, MSPs and Integrators

Fing Professional helps IT consultants and MSPs monitor client networks remotely. Get device discovery, inventory, and real-time alerts — without centralized infrastructure, domain credentials, or SSO. Built for pros working outside complex setups.

Read More
Twitter Facebook LinkedIn

Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

Cybersecurity researchers have disclosed details of a new malware called MDifyLoader that has been observed in conjunction with cyber attacks exploiting security flaws in Ivanti Connect Secure (ICS) appliances. Accordin...

Read More
Twitter Facebook LinkedIn

Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services

Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose a severe threat to managed AI cloud services. The vulnerability, tracked as CVE-2025-232...

Read More
Twitter Facebook LinkedIn

CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a phishing campaign that's designed to deliver a malware codenamed LAMEHUG. "An obvious feature of LAMEHUG is the use of LLM (large lang...

Read More
Twitter Facebook LinkedIn

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google on Thursday revealed it's pursuing legal action in New York federal court against 25 unnamed individuals or entities in China for allegedly operating BADBOX 2.0 botnet and residential proxy infrastructure. "The ...

Read More
Twitter Facebook LinkedIn

From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware

With IT outages and disruptions escalating, IT teams are shifting their focus beyond simply backing up data to maintaining operations during an incident. One of the key drivers behind this shift is the growing threat of...

Read More
Twitter Facebook LinkedIn
cover

Mastering Embedded Linux Development: Craft fast and reliable embedded solutions with Linux 6.6 and The Yocto Project 5.0 (Scarthgap) , Fourth Edition ($39.99 Value) FREE for a Limited Time

Mastering Embedded Linux Development is designed to be both a learning resource and a reference for your embedded Linux projects.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi