XStore Documentation

June 03, 2025 – Cyber Briefing

👉 What’s the latest in the cyber world today?

A fake Chrome extension steals Facebook session cookies, a Chrome V8 zero-day is patched, and JINX-0132 targets DevOps servers for cryptomining. The White House chief of staff’s phone is hacked, Cartier suffers a data breach, and The North Face is hit by another credential stuffing attack. CISA faces deep budget cuts, Australia enacts ransomware reporting rules, and Microsoft-CrowdStrike align threat actor naming for better attribution.

Listen to the full podcast


🚨 Cyber Alerts

1. Fake FB Ban Fix Extension Steals Accounts

A new scam promoted via YouTube videos is targeting Facebook users who want to recover banned pages by urging them to download a deceptive Chrome extension. Distributed from Google Drive instead of the official Chrome Web Store, this extension requests extensive dangerous permissions to access all Browse activity and cookies. The malware’s core function is to silently gather all Facebook session cookies and transmit them to an attacker-controlled server, allowing account hijacking without credentials and bypassing 2FA. This tactic gives attackers full account control for potential identity theft or spreading more scams, highlighting the risk of unofficial tools and the need for user vigilance.

2. Actively Exploited Chrome V8 Flaw Patched

Google released an emergency out-of-band security update on Monday for its Chrome browser to address CVE-2025–5419, a high-severity, actively exploited zero-day vulnerability. This flaw, an out-of-bounds read and write weakness in Chrome’s V8 JavaScript engine, could allow remote attackers to exploit heap corruption via crafted HTML pages. Discovered by Google’s Threat Analysis Group on May 27th, the issue was initially mitigated by a configuration change the next day, with browser version 137.0.7151.68 now rolling out. This marks the third Chrome zero-day vulnerability Google has patched since the start of 2025, and users are strongly advised to update their browsers immediately.

3. DevOps Servers Hit By JINX0132 Crypto Mine

A new cryptojacking campaign, tracked as JINX-0132 by Wiz, is targeting publicly accessible DevOps web servers like Docker, Gitea, HashiCorp Consul, and Nomad to illicitly mine cryptocurrencies. Attackers exploit a wide range of known misconfigurations and vulnerabilities to deliver miner payloads, often downloading necessary tools directly from public GitHub repositories to evade attribution. This campaign notably marks the first publicly documented instance of Nomad misconfigurations being exploited in the wild, with some compromised instances managing hundreds of resource-rich clients.

For more alerts, click here!

💥 Cyber Incidents

For more incidents, click here!

Click to See Tools

📢 Cyber News

For more news, click here

📈Cyber Stocks

On Monday, June 2, 2025, Zscaler rose 6.34%, CrowdStrike Holdings gained 1.65%, Palo Alto Networks increased 1.27%, Fortinet edged up 0.68%, SentinelOne dipped 2.16%, Varonis Systems climbed 3.38%, and Qualys advanced 1.52%.

💡 Cyber Tip

📚 Cyber Book

Click to Check Events

Copyright © 2025 CyberMaterial. All Rights Reserved.

Follow CyberMaterial on:

SubstackLinkedInTwitterRedditInstagramFacebookYouTube, and Medium.

Get Help

Online Scam Prevention & Recovery

Schedule a free consultation

A free 15-min cybersecurity consultation