Telegram (AI) YouTube Facebook X
Ру
AI at fraudsters’ service, Ukrainian phishers dismantled, and other cybersecurity developments

AI at fraudsters’ service, Ukrainian phishers dismantled, and other cybersecurity developments

Here are the past week’s key cybersecurity stories.

  • An AI code editor enabled a $500,000 crypto heist.
  • EU residents were ensnared by a Ukrainian cyber ring.
  • Gemini executes a malicious prompt.
  • Criminals laundered $21.8bn via decentralised protocols.

An AI code editor enabled a $500,000 crypto heist

Researchers at Kaspersky Lab reported the findings of an investigation into an incident that targeted a blockchain developer in Russia.

In June a fake extension for the Cursor AI IDE infected the victim’s devices with remote-access tools and infostealers. The compromise led to the theft of $500,000 in cryptocurrency.

Cursor AI IDE is an AI-enabled development environment based on Microsoft Visual Studio Code. It supports installing extensions via Open VSX, an alternative to the official Visual Studio Marketplace.

AI at fraudsters’ service, Ukrainian phishers dismantled, and other cybersecurity developments
Malicious plugin for Cursor AI IDE. Image: Kaspersky Lab.

The malicious extension, titled Solidity Language, was presented as a syntax-highlighting tool for Ethereum smart contracts. Notably, the victim’s OS had been installed only days before the incident, with just essential, popular software added to the compromised device.

EU residents ensnared in a Ukrainian cyber ring

In June Ukrainian cyber police, working with Czech law enforcement, concluded an investigation into a network of fraudulent call centres that had operated for a year and a half.

According to police, the criminals responded to online listings in the Czech Republic, Poland and other EU countries and sent sellers phishing links—purportedly for payment. The links led to spoofed pages mimicking well-known payment services, granting access to victims’ banking data. Part of the stolen 1.5 million hryvnia was converted into cryptocurrency.

AI at fraudsters’ service, Ukrainian phishers dismantled, and other cybersecurity developments
Arrest of members of the fraud ring. Photo: Cyber Police of Ukraine.

About 40 people took part in the scheme. Four organisers and ten operatives have been charged. As part of the criminal case, 29 searches were carried out across six regions of Ukraine; the suspects face up to 12 years in prison.

Gemini executes a malicious prompt

An information-security specialist and manager of 0DIN’s bounty programme focused on LLM, Marco Figueroa, disclosed Gemini’s susceptibility to prompt-injection attacks.

Google Gemini for Workspace can be used to generate email summaries that look legitimate yet contain malicious instructions and messages that steer users to phishing sites.

The attack hinges on crafting an email with an invisible directive. An adversary can hide a malicious instruction at the end of the message by setting the font size to zero or colouring it white.

Because there are no suspicious attachments or links, the message is likely to reach the recipient’s inbox. If the recipient opens the email and asks Gemini to summarise it, the AI will read the invisible instruction and execute it.

AI at fraudsters’ service, Ukrainian phishers dismantled, and other cybersecurity developments
Gemini’s response to a malicious prompt. Image: Marco Figueroa / 0DIN.

In Figueroa’s example, Gemini follows the malicious prompts and displays a warning that the user’s Gmail password may have been compromised. The message includes a fake support phone number that unwary users might call.

Criminals laundered $21.8bn via decentralised protocols

According to an Elliptic report, in 2025 criminals moved $21.8bn in ill-gotten funds through DEX, cross-chain bridges and conversion services. Of that, about $2.5bn was linked to North Korean hackers and roughly $300m to sanctioned Iranian crypto services.

Fraudsters use cross-chain bridges to obscure the origin of funds, launder money or circumvent blacklists imposed by the issuers of the Tether and Circle stablecoins.

Such cross-network abuse includes:

  • investment schemes;
  • meme-coin scams;
  • sanctions evasion;
  • other forms of fraud.

The analysts say the global volume of “decentralised” crime has tripled from 2023, when Elliptic tallied $7bn.

They expect crypto scammers to exploit public interest and new technologies more aggressively. Extra caution is advised during market upswings, when the influx of novices grows.

The report notes that a third of complex investigations involved three blockchains; more than five networks were involved in 27% of cases; and more than ten in 20% of operations.

Only 1.5% of 10m passwords are “strong”

On 15 July a research team at Specops Software analysed 10m random passwords drawn from a corpus of more than 1bn compromised credentials. The study included a visual heatmap showing the most common combinations of password length and complexity.

Only 1.5% qualified as “strong”.

The research highlights organisational security complacency. Many firms still allow employees to use weak passwords that are easy prey for cybercriminals.

AI at fraudsters’ service, Ukrainian phishers dismantled, and other cybersecurity developments
Heatmap of password strength. Data: Specops Software.

For the analysis, a strong password contained at least 15 characters and several different character classes, including digits, uppercase letters and special symbols.

Healthcare megabreach hits 5.4m people

According to TechCrunch, Episource, a major medical billing firm, notified U.S. residents that their personal and medical data had been stolen in a cyberattack earlier this year. The breach affected more than 5.4m people, making it one of 2025’s biggest in the healthcare sector.

Episource handles claims optimisation for physicians, hospitals and other healthcare organisations, processing large volumes of personal and medical information for insurance submissions.

Experts say the breach lasted a week and ended on 6 February. Stolen data includes:

  • personal data (names, mailing and email addresses, phone numbers);
  • confidential medical information (medical record numbers, information about physicians, diagnoses, prescriptions, test results and examinations);
  • health insurance data (programme names, policy numbers).

Although Episource has not specified the nature of the incident, the company’s partner Sharp Healthcare informed clients that it was the result of a ransomware attack.

End-of-train device vulnerability

On 10 July the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory about a vulnerability. Since its discovery, the Association of American Railroads took 12 years to stop using a radio protocol that can activate train brakes anywhere in North America.

The radio protocol links the locomotive to devices mounted on the last car.

AI at fraudsters’ service, Ukrainian phishers dismantled, and other cybersecurity developments
A device for communications, telemetry and braking on the last car of a train. Photo: Trains.

Such devices collect telemetry from the rear of the train—particularly important for long freight consists over a kilometre in length. The hardware can also receive commands from engineers, the most important being to brake the rear of the train.

An attacker with inexpensive equipment worth about $500 and a software-defined radio can issue commands to trigger the brakes.

Also on ForkLog:

  • Developers found a way to protect Bitcoin from quantum attacks.
  • BigONE was hacked for $27m.
  • Darknet marketplace Abacus Market is suspected of a $12m exit scam.
  • Losses from the Arcadia Finance protocol hack totalled ~$2.5m.
  • A Tornado Cash co-founder announced an urgent $1.5m fundraising for court proceedings.
  • MoonPay executives sent $250,000 to a fake Steve Witkoff.

What to read this weekend?

A decade ago he was called an alarmist; today his books read like a manual for the digital world. Why Evgeny Morozov is more relevant than ever in an era of data maximalism and AI hype—read the new instalment of “Silicon Tanks” from ForkLog.

Подписывайтесь на ForkLog в социальных сетях

Telegram (основной канал) Facebook X
Нашли ошибку в тексте? Выделите ее и нажмите CTRL+ENTER

Рассылки ForkLog: держите руку на пульсе биткоин-индустрии!

We use cookies to improve the quality of our service.

By using this website, you agree to the Privacy policy.

OK