Operation Secure conducted by Interpol across 26 countries led to the arrest of 32 suspects, seizure of 41 servers, and takedown of over 20,000 malicious IP addresses and domains.
Infostealer malware collects sensitive data for sale or further attacks; Lumma, RisePro, and MetaStealer families were targeted in Operation Secure.
Fog ransomware group uses uncommon tools like Syteca and GC2, linked to China's APT41, in a suspected cyberespionage attack.
Fog's toolset includes Adapt2x C2, Process Watchdog, and Impacket SMB for data exfiltration; the group blends legitimate software with open-source tools.
EchoLeak, a zero-click AI vulnerability in Microsoft 365 Copilot, allows data exfiltration without user interaction; the flaw has been patched by Microsoft.
EchoLeak exploits AI command injection with malicious prompts, tricking Copilot into leaking internal information via Microsoft Teams or SharePoint links.
The vulnerability in Copilot combines Outlook and SharePoint data without trust boundaries, highlighting risks in generative AI design.
EchoLeak's potential for stealthy data exfiltration or extortion poses significant threats in AI interactions, emphasizing the importance of proper isolation.