{"id":63469,"date":"2025-09-06T07:00:00","date_gmt":"2025-09-06T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=63469"},"modified":"2025-09-06T09:07:55","modified_gmt":"2025-09-06T06:07:55","slug":"a-free-tradingview-premium-hides-a-stealer-a-record-ddos-hits-cloudflare-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/a-free-tradingview-premium-hides-a-stealer-a-record-ddos-hits-cloudflare-and-other-cybersecurity-news\/","title":{"rendered":"A \u2018free\u2019 TradingView Premium hides a stealer, a record DDoS hits Cloudflare, and other cybersecurity news"},"content":{"rendered":"<p>We round up the week\u2019s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Hackers hid a stealer in a fake TradingView Premium.<\/li>\n<li>Researchers uncovered a stealer that targets crypto users.<\/li>\n<li>Extortionists threatened to feed artists\u2019 work to AI models.<\/li>\n<li>A vulnerability was found in the control of Chinese robots.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Hackers hid a stealer in a fake TradingView Premium<\/h2>\n<p>Cybercriminals ran fake ads offering a free installation of TradingView Premium to deliver malware to victims\u2019 Android devices, Bitdefender researchers <a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/labs\/malvertising-campaign-on-meta-expands-to-android-pushing-advanced-crypto-stealing-malware-to-users-worldwide\">reported<\/a>.<\/p>\n<p>The Brokewell malware appeared in early 2024. It has a wide range of capabilities, including theft of confidential data, remote monitoring and control of an infected device.<\/p>\n<p>According to the researchers, the campaign targeted cryptocurrency users. It has been active since at least July 22, using about 75 ads localised for the Russian-speaking segment.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/TradingView-Labubu.webp\" alt=\"TradingView-Labubu\" class=\"wp-image-265174\"\/><figcaption class=\"wp-element-caption\">An example of the attackers\u2019 ad. Source: Bitdefender.<\/figcaption><\/figure>\n<p>When victims clicked the link, they were redirected to a site masquerading as the official TradingView page, which offered the malicious file tw-update.apk. After installation, the app requested Accessibility permissions. If granted, it opened a supposed system update window while the infostealer silently granted itself the required privileges.<\/p>\n<p>The attackers also tried to obtain the phone\u2019s lock-screen PIN by imitating an Android system prompt.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/fake_tradingview_stealler.webp\" alt=\"fake_tradingview_stealler\" class=\"wp-image-265175\"\/><figcaption class=\"wp-element-caption\">A prompt to enter the phone\u2019s lock-screen PIN shown by the malware. Source: Bitdefender.<\/figcaption><\/figure>\n<p>Experts noted the scheme targeted only mobile users: visitors from other devices saw harmless content.<\/p>\n<p>According to Bitdefender, the fake app is an \u201cextended version of the Brokewell malware\u201d and supports the following functions:<\/p>\n<ul class=\"wp-block-list\">\n<li>scans for BTC, ETH, USDT and IBAN bank details;<\/li>\n<li>steals and exports Google Authenticator codes;<\/li>\n<li>takes over accounts via fake login screens;<\/li>\n<li>records the screen and keystrokes, steals cookies, activates the camera and microphone, and tracks geolocation;<\/li>\n<li>intercepts SMS, including banking and 2FA codes, by replacing the default messaging app;<\/li>\n<li>can receive remote commands via Tor or WebSockets to send SMS, place calls, delete software or even self-destruct.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Researchers found a stealer dangerous to crypto users<\/h2>\n<p>Researchers at F6 <a href=\"https:\/\/www.f6.ru\/blog\/phantom-stealer\/\">reported<\/a> the Phantom Papa campaign discovered in June. Attackers sent emails in Russian and English with attachments containing the Phantom stealer.<\/p>\n<p>Malware based on the code of the <a href=\"https:\/\/forklog.com\/en\/news\/a-subscription-to-crime-how-rented-hacking-software-imperils-web3\"><span data-descr=\"Crimeware-as-a-Service, subscription-based criminal software\" class=\"old_tooltip\">CaaS<\/span><\/a> tool Stealerium enables operators to steal passwords, banking and cryptocurrency information, and the contents of browsers and messengers.<\/p>\n<p>The recipients of the stealer-laden emails were organisations from various sectors: retail, industry, construction and IT.<\/p>\n<p>The report notes the use of lurid subjects such as See My Nude Pictures and Videos. Classic phishing lures also appeared, for example \u201cAttached copy of payment No.06162025\u201d.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/phantom_stealler.webp\" alt=\"phantom_stealler\" class=\"wp-image-265176\"\/><figcaption class=\"wp-element-caption\">A fragment of the attackers\u2019 phishing email offering to download an archive. Source: F6.<\/figcaption><\/figure>\n<p>When recipients unpacked and launched files with .img and .iso extensions from RAR attachments, the malware infiltrated the device. On execution, Phantom collected detailed information about the hardware and system configuration, and stole cookies, passwords, payment-card data from the browser, images and documents. The stolen data was delivered via Telegram bots such as papaobilogs.<\/p>\n<p>Another risk for cryptocurrency holders is the Clipper module. In an infinite loop with a two-second interval, it read the clipboard. If the content changed, the malware wrote it to a file, then scanned the active window for terms linked to crypto services: \u201cbitcoin\u201d, \u201cmonero\u201d, \u201ccrypto\u201d, \u201ctrading\u201d, \u201cwallet\u201d, \u201ccoinbase\u201d.<\/p>\n<p>If such terms were found, it searched the clipboard for wallet addresses using popular address fragments and replaced any found with preset attacker addresses.<\/p>\n<p>Phantom also includes a PornDetector module. It can monitor user activity and, if it finds one of the strings \u201cporn\u201d, \u201csex\u201d or \u201chentai\u201d, take a screenshot. If the window remains active, the module then captures an image from the webcam.<\/p>\n<h2 class=\"wp-block-heading\">Extortionists threatened to feed art to AI models<\/h2>\n<p>On August 30, alleged LunaLock extortionists posted on the Artists&amp;Clients service about a breach, <a href=\"https:\/\/www.404media.co\/hackers-threaten-to-submit-artists-data-to-ai-models-if-art-site-doesnt-pay-up\/\">404 Media<\/a> reports.<\/p>\n<p>The attackers demanded $50,000 in bitcoin or Monero from the owners of the art marketplace. Otherwise, they promised to publish all the data and pass the artworks to AI companies to train <span data-descr=\"large language model\" class=\"old_tooltip\">LLM<\/span> models.<\/p>\n<p>A countdown timer on the site gave the owners a few days to raise the sum. At the time of writing, the site is offline.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThis is the first case I have seen of threat actors using the threat of training AI models as an element of their extortion tactics\u201d<\/em>, said Flare senior cyber threat analyst Tammy Harper in a comment to 404 Media.<\/p>\n<\/blockquote>\n<p>She added that such tactics may prove effective against artists given the sensitivity of the issue.<\/p>\n<h2 class=\"wp-block-heading\">A vulnerability found in the control of Chinese robots<\/h2>\n<p>On August 29, a cybersecurity specialist going by BobDaHacker <a href=\"https:\/\/bobdahacker.com\/blog\/hacked-biggest-chinese-robot-company\">disclosed issues<\/a> in the security of a leading global supplier of commercial robots. The vulnerability allowed machines to obey arbitrary commands.<\/p>\n<p>Pudu Robotics is a Chinese manufacturer of robots for a wide range of tasks in industry and public places.<\/p>\n<p>BobDaHacker found that administrative access to the robots\u2019 control software was left unlocked. According to him, an attacker needs only to obtain a valid authorisation token or create a test account intended for trials before purchase.<\/p>\n<p>After initial authentication, there were no additional security checks. An attacker could redirect food deliveries or disable an entire fleet of restaurant robots, allowing anyone to make serious changes\u2014for example, renaming robots to complicate recovery.<\/p>\n<h2 class=\"wp-block-heading\">Cloudflare withstands a record DDoS attack<\/h2>\n<p>Cloudflare blocked the largest recorded <span data-descr=\"distributed denial-of-service\" class=\"old_tooltip\">DDoS<\/span> attack, which peaked at 11.5 Tbps, the network services provider said on September 1.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Cloudflare&#8217;s defenses have been working overtime. Over the past few weeks, we&#8217;ve autonomously blocked hundreds of hyper-volumetric DDoS attacks, with the largest reaching peaks of 5.1 Bpps and 11.5 Tbps. The 11.5 Tbps attack was a UDP flood that mainly came from Google Cloud.\u2026 <a href=\"https:\/\/t.co\/3rOys7cfGS\">pic.twitter.com\/3rOys7cfGS<\/a><\/p>\n<p>\u2014 Cloudflare (@Cloudflare) <a href=\"https:\/\/twitter.com\/Cloudflare\/status\/1962559687368593552?ref_src=twsrc%5Etfw\">September 1, 2025<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cCloudflare\u2019s defenses have been working overtime. Over the past few weeks, we\u2019ve autonomously blocked hundreds of hyper-volumetric DDoS attacks, the largest of which reached peaks of 5.1 billion packets per second and 11.5 Tbps\u201d<\/em>, the company said.<\/p>\n<\/blockquote>\n<p>The record attack lasted roughly 35 seconds and combined traffic from multiple <span data-descr=\"Internet of Things\" class=\"old_tooltip\">IoT<\/span> devices and cloud providers.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>Grokking. The Grok chatbot was <a href=\"https:\/\/forklog.com\/en\/news\/exploiting-grok-chatbot-used-to-spread-scam-links\">taught<\/a> to post scam links.<\/li>\n<li>A quantum computer <a href=\"https:\/\/forklog.com\/en\/news\/quantum-computer-cracks-tiny-cryptographic-key\">cracked<\/a> a \u201ctiny\u201d cryptographic key.<\/li>\n<li>The US <a href=\"https:\/\/forklog.com\/en\/news\/us-proposes-plan-to-shield-assets-from-quantum-threats\">proposed<\/a> a plan to protect assets from quantum threats.<\/li>\n<li>Hackers <a href=\"https:\/\/forklog.com\/en\/news\/hackers-conceal-malicious-links-in-smart-contracts\">hid<\/a> malicious links in smart contracts.<\/li>\n<li>A Venus user <a href=\"https:\/\/forklog.com\/en\/news\/phishing-drains-27m-from-venus-user\">lost<\/a> $27m to phishing.<\/li>\n<li>A psychology book <a href=\"https:\/\/forklog.com\/en\/news\/psychology-book-aids-in-hacking-chatgpt\">helped<\/a> \u201chack\u201d ChatGPT.<\/li>\n<li>Hackers <a href=\"https:\/\/forklog.com\/en\/news\/hackers-exploit-smart-wallets-to-steal-wlfi-tokens\">stole<\/a> WLFI tokens using smart wallets.<\/li>\n<li>Losses from crypto project hacks in August <a href=\"https:\/\/forklog.com\/en\/news\/august-crypto-hacks-result-in-163-million-losses\">reached<\/a> $163m.<\/li>\n<li>Binance <a href=\"https:\/\/forklog.com\/en\/news\/binance-aids-in-freezing-47-million-in-fraudulent-assets\">helped<\/a> freeze $47m in scammer assets.<\/li>\n<li>El Salvador <a href=\"https:\/\/forklog.com\/en\/news\/el-salvador-shields-its-6284-btc-from-quantum-threat\">secured<\/a> its 6,284 BTC against a quantum threat.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>In the FLMonthly digest, ForkLog spoke with cypherpunk Anton Nesterov about the main threats to privacy and how to counter them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We round up the week\u2019s most important cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":63470,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"This week\u2019s key cybersecurity stories, from fake TradingView to a record Cloudflare DDoS.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-63469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"444","promo_type":"1","layout_type":"1","short_excerpt":"This week\u2019s key cybersecurity stories, from fake TradingView to a record Cloudflare DDoS.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/63469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=63469"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/63469\/revisions"}],"predecessor-version":[{"id":63471,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/63469\/revisions\/63471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/63470"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=63469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=63469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=63469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}