{"id":92440,"date":"2025-12-20T07:00:00","date_gmt":"2025-12-20T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=92440"},"modified":"2025-12-22T10:58:09","modified_gmt":"2025-12-22T07:58:09","slug":"pornhub-premium-users-blackmailed-the-santastealer-crypto-drainer-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/pornhub-premium-users-blackmailed-the-santastealer-crypto-drainer-and-other-cybersecurity-news\/","title":{"rendered":"Pornhub Premium Users Blackmailed, SantaStealer Crypto Drainer, and Other Cybersecurity News"},"content":{"rendered":"<p>We have compiled the week&#8217;s key cybersecurity stories.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>A vulnerability in a JavaScript library was used to steal cryptocurrency.<\/li>\n<li>Hackers threatened to expose data on Pornhub premium users.<\/li>\n<li>Hackers promoted the new SantaStealer malware.<\/li>\n<li>Amazon warned about a large-scale clandestine cryptomining campaign.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">A JavaScript library vulnerability used to steal cryptocurrency<\/h2>\n<p>Instances of loading malware to drain crypto wallets have increased of late. It infiltrates websites via a flaw in React, a popular JavaScript library for building user interfaces, <a href=\"https:\/\/cointelegraph.com\/news\/react-vulnerability-wallet-drainer-attacks-crypto-websites\">Cointelegraph<\/a> reported.<\/p>\n<p>On December 3 the React team <a href=\"https:\/\/react.dev\/blog\/2025\/12\/03\/critical-security-vulnerability-in-react-server-components\">said<\/a> white-hat hacker Lachlan Davidson had found a vulnerability enabling unauthenticated remote code execution. A patch was released the same day.<\/p>\n<p>According to the non-profit cybersecurity organisation Security Alliance (<a href=\"https:\/\/forklog.com\/en\/news\/who-are-the-white-hats-and-how-do-they-protect-the-blockchain-industry\">SEAL<\/a>), attackers are exploiting this flaw to surreptitiously add wallet-drainer code to cryptocurrency sites.<\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/news\/what-is-web3\">Web3<\/a> protocols are not the only targets, SEAL <a href=\"https:\/\/x.com\/_SEAL_Org\/status\/1999953423672971318\">stressed<\/a>; all websites are at risk. Users were urged to exercise extreme caution when signing any transactions or approvals.<\/p>\n<h2 class=\"wp-block-heading\">Hackers threatened to expose data on Pornhub premium users<\/h2>\n<p>Users of the adult platform Pornhub faced extortion from the ShinyHunters group, the company\u2019s management <a href=\"https:\/\/help.pornhub.com\/hc\/en-us\/articles\/47334442459283-Important-Message-From-Pornhub\">said<\/a>.<\/p>\n<p>The letter states the platform was impacted by a breach at third-party analytics provider Mixpanel. The incident occurred on November 8, 2025 following <span data-descr=\"SMS-based phishing attack\" class=\"old_tooltip\">smishing<\/span>.<\/p>\n<p>According to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/pornhub-extorted-after-hackers-steal-premium-member-activity-data\/\">BleepingComputer<\/a>, Pornhub has not worked with Mixpanel since 2021, which helps date the incident.<\/p>\n<p>The contractor confirmed the breach affected \u201ca limited number\u201d of clients, among whom OpenAI and CoinTracker had previously been named.<\/p>\n<p>In comments to BleepingComputer, representatives said they did not consider their system the source of the leak:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cWe find no evidence that this data was stolen from Mixpanel during the November incident or otherwise. The last time this information was accessed was by a legitimate account of an employee of Pornhub\u2019s parent company in 2023.\u201d<\/em><\/p>\n<\/blockquote>\n<p>BleepingComputer learned ShinyHunters began blackmailing Mixpanel\u2019s clients last week, sending emails with ransom demands.<\/p>\n<p>In an ultimatum sent to Pornhub, the hackers claimed to have stolen 94GB of data containing more than 200m records of personal information.<\/p>\n<p>The group later confirmed to the outlet that the database includes 201,211,943 premium-subscriber accounts.<\/p>\n<p>Hackers provided the publication with a sample of the stolen data containing sensitive information:<\/p>\n<ul class=\"wp-block-list\">\n<li>user email address;<\/li>\n<li>type of activity (viewing, downloading, visiting a channel);<\/li>\n<li>location;<\/li>\n<li>video URL and title;<\/li>\n<li>keywords associated with the video;<\/li>\n<li>exact event timestamp.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Hackers tout new SantaStealer malware<\/h2>\n<p>The new data-stealing malware SantaStealer is being actively advertised on Telegram and underground forums. It is distributed under a <a href=\"https:\/\/forklog.com\/en\/news\/a-subscription-to-crime-how-rented-hacking-software-imperils-web3\">CaaS<\/a> model, <a href=\"https:\/\/www.rapid7.com\/blog\/post\/tr-santastealer-is-coming-to-town-a-new-ambitious-infostealer-advertised-on-underground-forums\/\">researchers<\/a> at Rapid7 said.<\/p>\n<p>According to them, SantaStealer is a rebrand of the BluelineStealer malware. It operates solely in memory to evade antivirus detection.<\/p>\n<p>The developer is running an active marketing campaign ahead of a full launch slated for year-end.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-f53ecf9a46bc5337-1389616914247309-1024x683.png\" alt=\"image\" class=\"wp-image-272187\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-f53ecf9a46bc5337-1389616914247309-1024x683.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-f53ecf9a46bc5337-1389616914247309-300x200.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-f53ecf9a46bc5337-1389616914247309-768x512.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-f53ecf9a46bc5337-1389616914247309-1536x1024.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-f53ecf9a46bc5337-1389616914247309.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Rapid7.<\/figcaption><\/figure>\n<p>The monthly CaaS subscription is offered in two tiers:<\/p>\n<ul class=\"wp-block-list\">\n<li>basic \u2014 $175;<\/li>\n<li>premium \u2014 $300.<\/li>\n<\/ul>\n<p>Rapid7 specialists analysed several SantaStealer samples and gained access to the affiliate interface. Despite numerous data-theft mechanisms, the malware falls short of the advertised detection-evasion capabilities.<\/p>\n<p>The research shows the stealer\u2019s control panel is user-friendly, allowing \u201cclients\u201d to configure builds\u2014from full-scale theft to compact, targeted payloads.<\/p>\n<p>SantaStealer uses 14 separate data-collection modules, each running in its own thread. Stolen data is written to memory, archived into a ZIP file and exfiltrated in 10MB chunks to the command server.<\/p>\n<p>According to the researchers, SantaStealer can be used to steal:<\/p>\n<ul class=\"wp-block-list\">\n<li>browser passwords, cookies, browsing history and saved payment cards;<\/li>\n<li>data from Telegram, Discord and Steam;<\/li>\n<li>data from Web3 applications and crypto-wallet extensions;<\/li>\n<li>documents from a device;<\/li>\n<li>screenshots of a user\u2019s desktop.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Amazon warned of a large-scale clandestine cryptomining campaign<\/h2>\n<p>Amazon GuardDuty security specialists <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/cryptomining-campaign-targeting-amazon-ec2-and-amazon-ecs\/\">discovered<\/a> a covert cryptomining campaign targeting Elastic Compute Cloud (EC2) and Elastic Container Service (ECS), which run virtual machines and application containers.<\/p>\n<p>By deploying cryptominers on the infrastructure, attackers profit at the expense of <span data-descr=\"Amazon Web Services\" class=\"old_tooltip\">AWS<\/span> customers and Amazon itself, which shoulder the compute costs.<\/p>\n<p>The attack used an image from <span data-descr=\"a software platform for quickly building, debugging and deploying applications using software containers\" class=\"old_tooltip\">Docker<\/span> Hub created in late October, which had more than 100,000 downloads at the time of discovery. Amazon emphasised that the attackers did not compromise the software itself but accessed customer accounts using stolen credentials.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-e115b30c2a26ab32-1389614946817165.webp\" alt=\"image\" class=\"wp-image-272186\"\/><figcaption class=\"wp-element-caption\">Source: Amazon.<\/figcaption><\/figure>\n<p>According to the report, a distinguishing feature of this campaign was a setting that prevented administrators from remotely shutting down machines. This forced security teams to first disable the protection manually and only then stop the mining.<\/p>\n<p>Amazon warned affected customers to rotate compromised credentials. The malicious image was removed from Docker Hub, though specialists cautioned it could be reuploaded under different accounts or names.<\/p>\n<h2 class=\"wp-block-heading\">Investor loses savings in AI-enabled romance scam<\/h2>\n<p>A bitcoin investor lost his funds after falling victim to a \u201cpig-butchering\u201d scam, according to The Bitcoin Adviser consultant Terence Michael.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">I have a Bitcoin client <br \/>who just lost all his Bitcoin.<\/p>\n<p>He isn&#8217;t wealthy. <br \/>He finally made it to 1 BTC.<br \/>I celebrated with him over the phone.<\/p>\n<p>But within days of him finally leaving Coinbase to setup a distributed multi-key security and inheritance protocol, he was approached by\u2026 <a href=\"https:\/\/t.co\/H1FK6Mbbyi\">pic.twitter.com\/H1FK6Mbbyi<\/a><\/p>\n<p>\u2014 Terence Michael (@ProofOfMoney) <a href=\"https:\/\/twitter.com\/ProofOfMoney\/status\/2000239818522120370?ref_src=twsrc%5Etfw\">December 14, 2025<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>He said the unnamed client transferred the leading cryptocurrency to a fraudster posing as a trader who promised to double his assets. The attacker also pretended to be a woman in love with the investor.<\/p>\n<p>Despite \u201cnumerous phone calls\u201d and \u201ca series of text messages\u201d with warnings, Michael failed to dissuade the client from sending BTC.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201c[\u2026] last night, while I was at dinner, I got a devastating message from him that he lost everything.\u201d<\/em><\/p>\n<\/blockquote>\n<p>Beyond losing his retirement savings, the recently divorced investor also bought the fraudster an airline ticket, expecting to meet the \u201cwoman.\u201d After the transfer, the attacker admitted the photos used were generated with AI.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>In Chrome, a free VPN <a href=\"https:\/\/forklog.com\/en\/news\/free-vpn-in-chrome-collected-ai-conversations\">collected<\/a> conversations with AI.<\/li>\n<li>In 2025, losses from hacks <a href=\"https:\/\/forklog.com\/en\/news\/losses-from-crypto-hacks-reached-3-4bn-in-2025\">reached<\/a> $3.4 billion.<\/li>\n<li>Tether <a href=\"https:\/\/forklog.com\/en\/news\/tether-introduces-cloud-free-password-manager\">unveiled<\/a> a password manager without cloud storage.<\/li>\n<li>The SEC <a href=\"https:\/\/forklog.com\/en\/news\/sec-ends-probe-into-defi-protocol-aave\">closed<\/a> its case against the Aave DeFi protocol.<\/li>\n<li>Solana <a href=\"https:\/\/forklog.com\/en\/news\/solana-endures-one-of-the-largest-ddos-attacks-in-history\">suffered<\/a> one of the most powerful DDoS attacks on record.<\/li>\n<li>Trump <a href=\"https:\/\/forklog.com\/en\/news\/trump-to-review-case-of-convicted-samourai-wallet-co-founder\">pledged<\/a> to review the case of the convicted Samourai Wallet co-founder.<\/li>\n<li>Bitcoin\u2019s hashrate <a href=\"https:\/\/forklog.com\/en\/news\/bitcoin-hashrate-drops-8-amid-rumors-of-mining-farm-raids-in-china\">fell<\/a> 8% amid rumours of raids on mining farms in China.<\/li>\n<li>Privacy <a href=\"https:\/\/forklog.com\/en\/news\/privacy-emerges-as-the-leading-trend-in-the-crypto-markets-future\">was named<\/a> the leading crypto-market trend for the coming years.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>An advertising algorithm in a household refrigerator, which accidentally matched the owner\u2019s name, triggered a severe psychotic episode.<\/p>\n<p>ForkLog looked into the details and how the \u201cEconomy of Things\u201d concept and crypto wallets could safeguard mental health from corporate overreach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have compiled the week&#8217;s key cybersecurity stories.<\/p>\n","protected":false},"author":1,"featured_media":92441,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Key cybersecurity stories of the week, from React exploits to Amazon\u2019s cryptomining warning.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-92440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"341","promo_type":"1","layout_type":"1","short_excerpt":"Key cybersecurity stories of the week, from React exploits to Amazon\u2019s cryptomining warning.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=92440"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92440\/revisions"}],"predecessor-version":[{"id":92479,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92440\/revisions\/92479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/92441"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=92440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=92440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=92440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}