XStore Documentation

June 06, 2025 – Cyber Briefing

👉 What are the latest cybersecurity alerts, incidents, and news?
Chrome extensions leak data and API keys, AMOS stealer bypasses macOS Gatekeeper, and BADBOX hijacks 1M+ IoT devices. InfoJobs suffers credential stuffing, German police and dog rescue orgs are hacked. Paula Stannard leads HIPAA enforcement, Play ransomware triples victims, and Mind raises $30M for on-device AI security.

Listen to the full podcast


🚨 Cyber Alerts

1. Chrome Extensions Leak Data And API Keys

Cybersecurity researchers have found that several popular Google Chrome extensions are exposing users to significant risks by transmitting data over unencrypted HTTP and by having sensitive API keys hard-coded in their software. The unencrypted HTTP traffic can leak Browse domains, machine IDs, and usage analytics, making users vulnerable to data interception and modification, particularly on public Wi-Fi networks. Separately, hard-coded API keys found in other extensions, including those from AVG and Microsoft, could be weaponized by attackers to drive up developer costs, corrupt analytics, or abuse services.

2. AMOS Stealer Hits macOS Via Fake CAPTCHA

A sophisticated malware campaign is targeting macOS users with a new variant of Atomic macOS Stealer (AMOS) using typo-squatted domains that mimic U.S. telecom provider Spectrum. This attack uses fake CAPTCHA verification pages to trick users into copying and executing a malicious shell script which then repeatedly prompts for their system password until it is entered correctly. After stealing the credentials, the malware uses them with sudo to remove quarantine attributes from the AMOS payload, successfully bypassing Apple’s Gatekeeper security feature. This campaign, which shows signs of Russian-speaking actors, represents a significant threat to organizations as the stolen macOS passwords can enable corporate network infiltration.

3. BADBOX Turns 1M+ IoT Devices Into Proxies

The FBI is warning that the BADBOX 2.0 malware campaign has infected over one million consumer Android IoT devices globally, many of which are manufactured in China and come preloaded with the threat. This sophisticated botnet connects devices like smart TVs and streaming boxes to attacker-controlled servers, converting them into residential proxies to mask malicious activity, commit ad fraud, and launch credential stuffing attacks. Due to the malware’s ability to survive factory resets, consumers are advised to assess their devices for suspicious activity, avoid unofficial app sources, and keep software updated to mitigate the risk.

💥 Cyber Incidents

📢 Cyber News

💡 Cyber Tip

📚 Cyber Book

Surviving A Cyberattack: Securing Social Media and Protecting Your Home Network by Todd G. Shipley, and Art Bowker

Click to Check Events

Copyright © 2025 CyberMaterial. All Rights Reserved.

Follow CyberMaterial on:

SubstackLinkedInTwitterRedditInstagramFacebookYouTube, and Medium.

Get Help

Online Scam Prevention & Recovery

Schedule a free consultation

A free 15-min cybersecurity consultation