XStore Documentation

June 09, 2025 – Cyber Briefing

👉 What’s happening in cybersecurity today?

Malware hits npm, PyPI, and Salesforce via SOQL flaw, HelloTDS uses fake CAPTCHAs for mass infections. Chaos gang breaches Optima Tax, Sorbonne leaks staff data, Brazil city health services go offline. Trump rolls back Biden-era cyber rules, DOJ targets North Korean IT scam funds, and OpenAI bans state hackers from ChatGPT.


🚨 Cyber Alerts

1. Sabotage Theft Malware On npm And PyPI

Cybersecurity researchers have uncovered a new supply chain attack where malicious code was injected into over a dozen packages related to GlueStack, delivering a remote access trojan to users. In a separate incident on npm, two rogue packages were discovered that act as destructive wipers, designed to delete entire application directories in an unusual case of sabotage rather than for financial gain. Concurrently, a new Python-based credential harvester on the PyPI repository, posing as an Instagram growth tool, has been found to steal user logins and broadcast them to multiple bot services.

2. Salesforce SOQL Flaw Exposed User Records

A critical zero-day vulnerability was discovered in a default Salesforce Aura controller, allowing attackers to extract sensitive user and document details via Salesforce Object Query Language (SOQL) injection techniques. Security researcher Tobia Righi found that the flaw, affecting thousands of deployments by default, could be exploited using error-based blind injection to enumerate database information. After being notified of the issue in late February 2025, Salesforce quietly patched the widespread vulnerability without issuing a public advisory, CVE number, or release notes. This silent patching approach has left the security community without official guidance on detection methods or indicators of compromise, making it difficult for organizations to assess if they were previously breached.

3. HelloTDS Spreads Malware Via Fake CAPTCHAs

Cybersecurity researchers have uncovered a complex Traffic Direction System dubbed “HelloTDS” that orchestrated the delivery of malware to over 4.3 million devices in April and May 2025 alone. This system uses advanced fingerprinting on users visiting compromised websites to selectively redirect suitable targets to malicious landing pages, most often deceptive FakeCaptcha verification screens. The FakeCaptcha pages then trick victims into executing harmful commands which initiate a multi-stage attack that ultimately installs infostealers like LummaC2 or remote access trojans. The campaign’s ability to serve benign content to evade researchers and dynamically rotate its infrastructure highlights a sophisticated threat that exploits user trust in familiar CAPTCHA interfaces.

💥 Cyber Incidents

📢 Cyber News

💡 Cyber Tip

📚 Cyber Book

Fix Your Online Reputation: A Guide to Saving Your Brand Online by Gert Mellak




Click to Check Events

Copyright © 2025 CyberMaterial. All Rights Reserved.

Follow CyberMaterial on:

SubstackLinkedInTwitterRedditInstagramFacebookYouTube, and Medium.

Get Help

Online Scam Prevention & Recovery

Schedule a free consultation

A free 15-min cybersecurity consultation