This is the week of autonomous AI, kind of. We have two reports of AI autonomously hacking, and extorting based on what it has found from the victims systems.
On the APT groups it’s a week of China, they seem to be focusing on networking devices, so if you are lucky enough to have physical routing devices you might want to triple check they are all patched up.
And advise your friends and family that not e-mails that come from Google Classroom are pure gold, some might actually be scams.
P.S. You can also get this summary on your e-mail every Monday. Scroll down to subscribe ⬇️
Anthropic’s August threat report reveals a “vibe hacking” campaign in which a criminal group leveraged its Claude Code LLM to fully automate reconnaissance, network intrusion, data theft, and customized extortion demands against 17 international organizations.
Key Details
Read more at Dark Reading, Anthropic, CSO Online
ESET researchers have identified PromptLock, a proof-of-concept ransomware that uses OpenAI’s open-weight gpt-oss:20b model via the Ollama API to generate and run malicious Lua scripts on victim machines in real time. By shifting script generation into a local AI model, PromptLock can vary its indicators of compromise and evade traditional signature-based defenses.
Key Details
Next Steps
Read more at Dark Reading
Google’s Threat Intelligence Group and Mandiant report that a financially motivated actor tracked as UNC6395 stole OAuth access and refresh tokens from the Salesloft Drift third-party app to exfiltrate large volumes of data from over 700 Salesforce customer instances. UNC6395 systematically queried Salesforce objects for secrets—like AWS keys and Snowflake tokens—then deleted query jobs to cover their tracks. Salesloft and Salesforce have revoked all Drift tokens and removed the app from AppExchange, urging customers to treat their Salesforce data as compromised.
Key Details
Next Steps
Read more at Google Cloud Blog, Salesloft Trust Center
Researchers at Sophos uncovered threat actors using the open-source Velociraptor forensic tool to download and run Visual Studio Code with a built-in tunnel option for command-and-control access.
By leveraging Windows msiexec and Cloudflare Workers as a staging ground, attackers minimized custom malware and embraced living-off-the-land tactics. This pattern signals a shift toward weaponizing legitimate incident-response software to establish stealthy footholds prior to ransomware or further compromise.
Key Details
Next Steps
Read more at Sophos CTU Research, The Hacker News, Sophos Counter Threat Unit
CISA, NSA, FBI and 13 international partners published a 37-page advisory outlining
how PRC-linked APT groups like Salt Typhoon exploit unpatched routers and firewalls
to persist in telecom, government, transportation and military networks. The guide
prioritizes patching known CVEs in Cisco, Palo Alto Networks and Ivanti products,
hardening management planes, and coordinating threat-hunting to detect covert tunnels
and on-box containers.
Key Details
Next Steps
Read more at CISA Advisory, Cybersecurity News
On August 26, attackers published malicious versions of core Nx npm packages that embedded postinstall scripts to scan for and harvest 2,349 GitHub tokens, cloud credentials, and AI API keys. The breach exploited a misconfigured GitHub Actions pull_request_target workflow to gain elevated permissions and exfiltrate secrets into “s1ngularity-repository” repos under victim accounts.
Key Details
Next Steps
Read more at The Hacker News
Check Point uncovered a global phishing campaign that weaponized Google Classroom to distribute 115,000 malicious invitations over one week to 13,500 organizations across multiple sectors. By sending fake “virtual classroom” invites from a legitimate Google domain with irrelevant commercial offers and directing victims to contact attackers via WhatsApp, the campaign bypassed traditional email filters.
Key Details
Read more at CSO Online
A whistleblower complaint from SSA Chief Data Officer Charles Borges alleges that Elon Musk’s Department of Government Efficiency (DOGE) copied the agency’s full NUMIDENT Social Security database—containing names, SSNs, birth data and family details for over 300 million Americans—into a test AWS environment that lacked mandated security controls or oversight.
The move bypassed FISMA authorization-to-operate (ATO) procedures and may violate federal privacy and cybersecurity laws, exposing a single high-value data store to potential compromise. Security teams and CISOs should assume this data is at elevated risk until independent audit and containment are confirmed.
Key Details
Read more at CSO Online, FedScoop
Subscribe to receive weekly cybersecurity news summary to your inbox every Monday.