Site iconSite icon ForkLog

New computer-hacking methods, SMS phishing and other cybersecurity developments

New computer-hacking methods, SMS phishing and other cybersecurity developments

We have gathered the week’s most important cybersecurity news.

  • The FBI puts cybercrime losses at $21bn.
  • Chrome adds chip-level protection against info-stealers.
  • Ukraine unmasks “helpers” offering crypto trading.
  • Researchers reveal new ways to hack computers.

The FBI estimates $21bn in cybercrime losses

Victims in the United States lost around $21bn to cybercrime, according to a report by the FBI for 2025.

Top categories included investment fraud, business email compromise, tech-support scams and data breaches. The tally rose by 26% compared with 2024.

Source: FBI.

Last year, the most common complaints were:

The last category accounted for 49% of recorded incidents, with losses of $8.6bn. However, the largest damage came from cryptocurrency-related crime: losses exceeded $11bn across 181,565 cases.

Source: FBI.

Key findings:

Chrome gets chip-level protection against info-stealers

Google launched Device Bound Session Credentials (DBSC) in Chrome 146 for Windows. The feature is designed to block malware from stealing and reusing cookies.

Session cookies act as authentication tokens that let users access accounts without re-entering credentials. Info-stealers such as GlassWorm and LummaC2 have learned to extract these data effectively from browser memory or local files.

DBSC cryptographically binds a user’s session to specific hardware—the computer’s security chip:

How the protection works:

If an attacker steals cookies, they become almost immediately useless, as the server will not validate the session without the hardware-held key. macOS users will get the feature in a future Chrome update.

Ukraine exposes “helpers” in cryptocurrency trading

Ukrainian law enforcement uncovered a scheme to steal cryptocurrencies under the guise of trading assistance to “multiply profits,” the Cyber Police reported

According to investigators, the perpetrators found potential victims in thematic Telegram channels. They sent links to fake websites that mimicked trading platforms but contained malware—crypto-drainers.

After connecting a wallet to such a site, victims effectively granted the attackers full access to their assets without additional confirmation.

Scale of losses:

The attackers moved funds between wallets, swapped them for other assets and converted them to cash.

Police carried out 20 simultaneous searches at the residences of group members and at an office location. They seized computer equipment and mobile phones, cash and records confirming the illegal activity.

Four members, including a co-organiser, were notified of suspicion of large-scale fraud and laundering of criminal proceeds.

The charges carry up to 12 years in prison with confiscation of assets.

Researchers disclose new ways to hack computers

Three research groups presented new attacks on Nvidia GPUs’ memory. They can grant hackers privileged access by exploiting “bit flips.”

Memory cells store information as electrical charges that define bits as 1s or 0s. A Rowhammer attack intensively agitates some cells to alter the charge in adjacent ones, causing bit flips.

New Rowhammer variants targeting GDDR6 video memory:

The team from Toronto shared details with Nvidia, Google, AWS and Microsoft back in November 2025. In response, Google paid the researchers $600 under its bug-bounty programme. Nvidia said it may update its last-year security bulletin related to GPUHammer.

Hackers exploited an old flaw in the Flowise AI platform 

Hackers have begun actively exploiting a maximum-severity vulnerability in the Flowise AI platform, said VulnCheck cybersecurity expert Caitlin Condon.

The tool is designed to build applications based on a LLM using AI agents, including by users without technical skills. 

According to Condon, the flaw allows JavaScript code to run without any security checks. The issue was publicly disclosed in September last year with a warning that successful exploitation leads to command execution and access to the file system.

According to the expert, the problem lies in the Flowise CustomMCP node, which allows configuration of a connection to an external server. At the time it was observed, activity was limited and originated from a single Starlink IP address.

Between 12,000 and 15,000 custom Flowise instances are accessible online. It is not yet clear what share remain vulnerable.

Condon recommended updating the software to version 3.1.1 (or at least 3.0.6), and considering disconnecting instances from the internet if external access is not required.

In the US, scammers sent “fine notices” with phishing QR codes

Fraudsters sent fake SMS about unpaid traffic fines, posing as state courts, BleepingComputer reports.

The QR code led to a phishing site to take a $6.99 payment and subsequently steal personal and financial data. 

The new campaign began a few weeks ago, according to the outlet. One user shared with the publication the text of a message targeting New York residents. Similar SMS reached victims in other states.

Unlike previous campaigns with ordinary links, this version used an image of an alleged court notice.

The message received by the newsroom claimed it was sent by the “Criminal Court of the City of New York.” The recipient was threatened: either immediate payment of a fine for parking or toll violations, or a court appearance.

Source: BleepingComputer.

How the phishing worked:

  1. Scanning the code led to an intermediary site to solve a CAPTCHA, used to evade automated security systems.
  2. After that, the user landed on a site mimicking the Department of Motor Vehicles or another agency. In all examples, the “debt” amount was the same.
  3. Clicking the payment button opened a form to enter personal details and bank-card information.

According to the outlet, the data were then stolen and could be used for fraud and identity theft.

Also on ForkLog:

What to read this weekend?

In a new piece, ForkLog and industry experts examine how DAOs are developing and what holds decentralised organisations back. 

Exit mobile version