Featured Story
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries.
NotDoor is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word. When detected, it enables attackers to exfiltrate data, upload files, and execute commands on the victim’s computer. The malware is deployed via Microsoft’s OneDrive executable using DLL side-loading, which installs the VBA backdoor and disables macro security protections.
The malware supports four commands: cmd and cmdno for executing commands, dwn to exfiltrate files, and upl to drop files to the victim’s computer.
Other Stories
Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack
Google released September 2025 Android security patches fixing 120 vulnerabilities, including two zero-days (CVE-2025-38352 and CVE-2025-48543) actively exploited in targeted attacks. Both flaws allow privilege escalation without user interaction or additional permissions.
Google’s Threat Analysis Group discovered one flaw in the Linux kernel, suggesting potential spyware campaigns.
Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure
Cybercriminals are using HexStrike AI (a legitimate penetration testing tool) to automatically exploit Citrix vulnerabilities within a week of disclosure. The tool integrates with 150+ security tools and automates vulnerability discovery and exploit development.
Darknet forums show criminals exploiting recent Citrix flaws and selling vulnerable NetScaler instances, shrinking the window between disclosure and exploitation.
The CCB warns about ongoing campaign distributing trojanized PDF applications
The CCB warns organisations about a malicious campaign delivering trojanized PDF editors or product manuals. Once installed, this malware can steal credentials and turn Windows devices into proxies. Several incidents have already been reported, and the CCB is treating this campaign as high risk.