fbpx

Get Callback

Edit Template

Cyber Pulse Monthly – November 2025

1. $262M Lost to ATO Scams

Account-takeover fraud surged dramatically in 2025, with losses crossing $262 million as attackers used AI-powered phishing, spoofed banking interfaces, and fake holiday sales to trick victims. Over 5,100 complaints were filed with the FBI, most involving high-pressure social-engineering tactics that bypassed MFA. Criminals used deepfake voice calls to impersonate bank representatives and convince victims to reveal sensitive data. The rise of synthetic identities and automated credential stuffing has made ATO one of the fastest-growing financial cybercrimes of the year.

2. Adda.io Breach Exposes 18.6 Lakh Users

A major data breach at Adda.io exposed personal records of 1.86 million Indian residential-community users. The leaked data included names, phone numbers, emails, and hashed passwords, raising risks of identity theft and targeted fraud. Security researchers confirmed that the attacker offered the dataset on underground forums. The platform, widely used for housing-society management, faced criticism for lacking modern encryption standards. The breach highlighted the increasing vulnerability of real-estate tech services, urging residents and admins to update passwords and enable additional security measures.

3. North Korean Hackers Push 197 Malicious npm Packages

North Korean threat actors intensified the “Contagious Interview” campaign by uploading 197 malicious npm packages that delivered an updated OtterCookie infostealer. These packages were downloaded more than 31,000 times before removal. The malware targeted developers’ systems, extracting credentials, browser cookies, SSH keys, and crypto wallets. Security analysts discovered infrastructure links to earlier Lazarus-connected supply-chain attacks. The incident emphasized the growing vulnerabilities in open-source ecosystems where attackers exploit developer trust, injecting harmful code into legitimate workflows with devastating downstream effects.

4. Rhysida Ransomware Disrupts Major U.S. Healthcare Network

A coordinated Rhysida ransomware attack crippled multiple U.S. hospitals, triggering ambulance diversions and halting digital operations. Attackers exfiltrated confidential patient data, medical records, and internal communications before encrypting devices. The healthcare provider shifted to manual processes, causing delays in surgeries and emergency care. The incident added to mounting pressure on a sector already strained by rising cyberattacks. Experts say healthcare remains a prime ransomware target due to outdated systems and life-critical environments where victims often feel pressured to pay.

5. European Grid Sees Coordinated Intrusion Attempts

European energy officials confirmed several intrusion attempts on electricity and gas control systems across multiple nations. Although operations were not disrupted, analysts traced the attempts to a sophisticated state-sponsored group probing SCADA and ICS vulnerabilities. Investigators noted similarities to earlier campaigns targeting Eastern European power companies. The coordinated activity raised concerns about geopolitical tensions spilling into cyber warfare. Governments across the region have now increased monitoring, enhanced segmentation of control networks, and requested rapid ICS vulnerability assessments to strengthen national resilience.

6. Google Blocks Massive AI-Phishing Attack on Gmail Users

Google intercepted over 80,000 AI-generated phishing emails within two days, marking one of the largest such waves to date. Attackers used advanced text-style transfer models to craft human-like messages that bypassed traditional spam filters. These emails impersonated delivery services, subscription platforms, and banks, tricking users into entering credentials on malicious sites. Google’s security team deployed real-time behavioral detection to neutralize the campaign. The incident demonstrated how generative AI is rapidly enhancing the sophistication of low-cost cybercrime operations.

7. DeFi Platform Hit by $28M Smart-Contract Exploit

A prominent DeFi aggregator suffered a devastating hack after attackers exploited a logic flaw in its smart contracts. The vulnerability enabled unauthorized withdrawals, draining more than $28 million in various assets, including stablecoins and wrapped tokens. Blockchain forensics linked the attacker’s wallet activity to earlier North-Korean-associated crypto thefts. Despite attempts to halt transactions, liquidity pools were emptied within minutes. The event re-ignited discussions about the need for formal verification, deeper audits, and mandatory update frameworks for decentralized financial protocols.

8. Deepfake Fraud Cases Surge Across Australia

Australia reported a sharp increase in deepfake-enabled corporate fraud, with cybercriminals using AI-generated voice and video impersonations to authorize financial transfers. Several organizations lost large sums after employees unknowingly approved fake requests appearing to come from senior executives. Law-enforcement agencies warned that deepfakes are becoming accessible and more realistic, making traditional verification inadequate. The government issued corporate guidelines recommending multi-person authorization, biometric verification, and anomaly detection systems to combat this new wave of AI-driven impersonation attacks.

9. Mobility Service API Leak Exposes Rider Locations

A popular ride-hailing startup disclosed an API vulnerability that leaked sensitive rider data such as live locations, ride history, and partial contact numbers. Security researchers discovered that certain endpoints lacked authentication checks, allowing unauthorized access through simple queries. The company immediately patched the flaw and initiated user notifications. Experts cautioned that mobility services store extensive behavioral data, making them prime targets. The incident highlighted the necessity for rigorous endpoint testing and continuous API monitoring as platforms expand.

10. “SkimFox” Campaign Hits Global Retailers Ahead of Holidays

Thousands of online stores were infected with a new credit-card skimming malware dubbed “SkimFox.” The script sat quietly on checkout pages, capturing payment data from unsuspecting customers and forwarding it to offshore servers. Researchers found that attackers used compromised third-party plugins to spread the skimmer rapidly across retail platforms. With major holiday shopping events approaching, cybersecurity agencies urged retailers to audit their storefront codebases and monitor unauthorized script injections. Consumer financial fraud risks are expected to increase significantly.

11. Global Banks Warn of AI-Powered Fraud Rings

International banking groups issued a collective advisory after detecting AI-generated synthetic identities used to open fraudulent accounts across multiple countries. Fraud rings leveraged stolen data and AI-fabricated documents to bypass KYC verification. The accounts were used for mule networks, laundering millions through crypto mixing and cross-border transfers. This marks one of the most sophisticated financial cybercrime operations of 2025. Regulators are now urging banks to adopt behavioral biometrics, document-forensics AI, and continuous transaction monitoring to combat next-gen identity fraud.

12. Meta Reports Major Surge in Account Hijacks

Meta confirmed a 34% rise in account-hijacking attempts across Facebook and Instagram, driven by token-stealing malware spreading through deceptive ads. Attackers targeted influencers, business accounts, and ad managers to run scam campaigns. Compromised accounts were used to redirect victims to phishing sites or cryptocurrency fraud pages. Meta rolled out hardware-key support and improved suspicious-login alerts. Security analysts warn that social-media hijacks are becoming more lucrative due to integrated payment features and advertising tools that attackers exploit at scale.

13. Critical VMware Vulnerability Exploited in Wild

Cybersecurity researchers discovered active exploitation of a zero-day vulnerability in VMware ESXi servers, allowing remote attackers to execute arbitrary code and deploy ransomware. Exploitation attempts were traced to multiple groups, including financially motivated gangs and state actors. The flaw impacts thousands of enterprise servers globally, especially cloud providers and data centers. Administrators were urged to patch systems immediately and isolate exposed hosts. This incident renewed concerns over high-value virtualization platforms increasingly becoming priority targets for large-scale ransomware operations.

14. India’s CERT-In Blocks Massive Botnet Targeting Government Portals

CERT-In successfully thwarted a widespread botnet attack targeting Indian government authentication portals. The botnet used credential-stuffing scripts and CAPTCHA-solving APIs to brute-force citizen service accounts. Despite millions of attempts, defenses held, preventing unauthorized access to Aadhaar-linked services and tax platforms. Analysts attribute the attack to a foreign threat group testing scalability of automated intrusion tools. The government is enhancing behavioral analytics and multi-layer verification methods to safeguard citizen data from evolving botnet-driven exploits.

15. AI-Worm “GhostLink” Attempts Self-Propagating Browser Exploit

Researchers uncovered an experimental browser-based AI worm named “GhostLink,” capable of autonomous self-replication using WebAssembly vulnerabilities. Once a device was infected, it attempted to spread through messaging apps, browser sync features, and cloud file shares. Early tests showed limited success but demonstrated the feasibility of AI-guided worm behavior. Although contained quickly, this event raised alarms about the next generation of automated cyber threats that can self-evolve and propagate without human input. Security teams globally began monitoring for copycat variants.

16. U.S. Universities Hit by Massive Data-Scraping Operation

Several major American universities reported unauthorized scraping of student databases, academic records, and research logs. Attackers exploited outdated APIs and unsecured dashboards used by faculty. The stolen data was later found for sale on dark-web forums targeting scholarship fraud and identity-theft schemes. This incident prompted universities to overhaul access controls and require mandatory cybersecurity training for all staff. With higher-education institutions handling increasing amounts of personal data, experts warn more targeted attacks are likely.

17. Aviation Sector Faces GPS Spoofing Campaign

Multiple airlines observed GPS spoofing attempts near major airports, causing minor navigation irregularities in flight-management systems. Although safety was not compromised, investigations revealed a coordinated campaign to disrupt aviation telemetry. Analysts suspect a state-aligned threat actor testing cyber-electronic interference capabilities. Aviation authorities issued advisories and began enhancing redundancy systems for aircraft positioning. This event highlighted the growing overlap between cyber threats and real-world physical safety, especially in transportation sectors reliant on precision navigation.

18. AI-Generated Malware Bypasses Traditional Sandboxes

Security firms reported sightings of an AI-generated malware strain capable of detecting sandbox environments and modulating its execution patterns to avoid detection. The malware used adversarial learning to analyze behavior­-based defenses and change signatures mid-runtime. It targeted financial institutions and government networks, stealing session tokens and encrypted files. Analysts warn that adaptive malware is entering mainstream cybercrime, raising the need for next-gen detection systems capable of analyzing intent rather than static behavior indicators.

19. Major Logistics Company Suffers Supply-Chain Breach

A multinational logistics provider experienced a major breach after attackers compromised a third-party warehouse management software. The intrusion exposed shipment routes, customs documents, and corporate login credentials. The attackers leveraged internal access to map global cargo flows, raising concerns about potential physical theft and targeted interception operations. The company initiated a major audit of all vendor systems. Experts say supply-chain attacks continue to rise as adversaries exploit weaker links in globally interconnected logistic networks.

20. Password-Manager Sync Bug Exposes Encrypted Vault Metadata

A widely used password manager revealed a critical sync flaw that leaked metadata such as vault creation dates, folder names, and usage patterns. Although passwords remained encrypted, the metadata could help attackers profile users and target accounts with high-value assets. The issue affected both desktop and mobile clients before being patched. Privacy advocates argue that metadata exposure is an under-recognized risk, especially for tools entrusted with sensitive information. The company rolled out a redesigned sync architecture to prevent future leaks.

Leave a Reply

Your email address will not be published. Required fields are marked *

About Us

Luckily friends do ashamed to do suppose. Tried meant mr smile so. Exquisite behaviour as to middleton perfectly. Chicken no wishing waiting am. Say concerns dwelling graceful.

Services

Most Recent Posts

  • All Post
  • Blog
  • Cyber Pulse Monthly
  • Cybersecurity
  • Cybersecurity Lab
  • Technology
    •   Back
    • Cyber Attack
    • Cyber News
    • Ransomware
    • Cybersecurity Career

Company Info

She wholly fat who window extent either formal. Removing welcomed.

About Us

Tech Skill School is an online learning platform committed to providing high-quality education and professional development in the field of technology. Our goal is to help individuals gain the skills necessary to excel in their careers and meet the demands of the ever-evolving tech industry.

Contact

Australia - HQ

46 Hoskins Street Canberra, ACT

info@techskillschool.com

+61423002099

India - HQ

305 Waghawadi Road, Bhavnagar, Gujarat

admin@techskillschool.com

+91-9512026616

Resources

Blogs
Mindmap
Webinars
Learning Resources
Digital Book

Follow us!

Copyright © 2023 Tech Skill School. All Right Reserved.
Designed and Developed by ProClickCoders.