Archive for author: makoadmin

No thanks: Google lets its Gemini AI access your apps, including messages

If you’re an Android user, you’ll need to take action if you don’t want Google’s Gemini AI to have access to your apps. That’s because, regardless of your previous settings, Google now allows Gemini to interact with third-party apps.

Through Gemini extensions, it already had the ability to integrate with apps to lend a helping hand and make Google Assistant obsolete. From an email I received in April from Google Gemini:

Gemini uses info from your devices and services to help you

Gemini uses this info to provide more customized and context-aware help. Gemini accesses certain system permissions and data, like call and message logs, contacts (to help you keep in touch), and screen content (to help you act on it).

Gemini works with apps
Gemini can respond with real-time info from other tools, apps, and services like Google Keep and YouTube. To allow connected apps to generate helpful responses, Gemini shares some of your info with them. You can manage your apps in your settings.

Then further on, it said:

Gemini activity and your choices  
When you use Gemini, Google collects your activity, like your chats (including recordings of your Gemini Live interactions), what you share with Gemini (like files, images, and screens), product usage information, feedback, and info about your location. This data is stored in Activity (if it’s on), reviewed by trained reviewers, and used to improve Google services, including generative AI.

The bit about trained reviewers was enough for me to decide against using it. There are many AI options that offer a lot more privacy.

But now, according to Ars Technica, Google has sent an email to Android users that takes it one step further.

Gemini notification mail
Image courtesy of ArsTechnica

“We’ve made it easier for Gemini to interact with your device
We’re updating how Gemini interacts with some of the apps on your Android device.
Gemini will soon be able to help you use your Phone, Messages, WhatsApp, and utilities on your phone, whether your Gemini Apps Activity is on or off.

This change will start automatically rolling out on July 7, 2025.
If you don’t want to use these features, you can turn them off in the Apps settings page.

If you have already turned these features off, they will remain off.

For more details on how these features work with your data, please see the Gemini Apps Privacy Hub.”

Note: I did not receive this email and the Gemini app is not on my phone. That could be because I’m using a Samsung phone and Samsung offers Bixby as a virtual assistant. It might be my location: sometimes Europe gets these features later. Or potentially the phone is too old (2019).

Good news or not?

While Google presents this as happy news, we’re not in full agreement. Google enabling Gemini to access third-party apps promises exciting AI-driven features but also introduces significant privacy, security, and control challenges.

Android users who want to protect their data and limit AI access should check their app permissions and disable unnecessary AI integrations. However, it turns out, this is not easy. First off, there is a contradiction in Google’s statements. In one place it says the change will automatically start rolling out and will give Gemini access to apps such as WhatsApp, Messages, and Phone “whether your Gemini apps activity is on or off.” But in another place it claims, “If you have already turned these features off, they will remain off.”

This is confusing, and even well-versed users are having problems finding the appropriate settings.

All we can do is advise you to make your own, informed, decisions as much as you can:

  • If Android introduces notifications or permission prompts for Gemini access, pay close attention and deny access where possible.
  • Regularly check app permissions in Settings > Privacy > Permission Manager and revoke permissions that are not essential, especially those related to sensitive data (contacts, messages, microphone, camera).
  • If possible, keep your Android OS and apps updated to benefit from security patches and improved privacy controls.
  • Don’t underestimate the importance of an active anti-malware solution on your Android phone.

If Google wants users to be happy about new features, than we’d prefer it announce them and then explain how those who like them can enable them. Don’t turn on settings that we’ve never asked for.


We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.

Ransomware negotiator investigated over criminal gang kickbacks

If someone is going to negotiate with criminals for you, that person should at least be on your side. That might not have been the case at Digital Mint, a ransomware negotiation company where one worker allegedly went rogue.

According to Bloomberg, Digital Mint is cooperating with the US Department of Justive (DoJ) to investigate allegations that a former employee had worked with ransomware criminals. The company operates a service where it acted as an intermediary between ransomware thieves and their victims, negotiating ransomware demands down to reasonable levels.

The employee allegedly cut deals with ransomware criminals to profit from extortion payments. DigitalMint President Marc Jason Grens told Bloomberg that a criminal investigation was underway, and that the employee involved had since been fired. There is no suggestion that Digital Mint knew about the employee’s actions or supported them in any way.

A ransomware negotiator’s role is to deal with ransomware criminals on a victim’s behalf. The customer pays them to negotiate adjustments to the crooks’ initial demands, which can often be exorbitant.

It’s important that the negotiator doesn’t take any cut from the ransomware thieves because it muddies the waters and changes their motivation. It creates an incentive to keep the ransomware payment high, which maximizes their profit. “The problem with that is it ripe for fraud between me and the bad guys,” said one negotiator, interviewed by TechTarget.

Ransomware recovery services have faced some bad press in the past. In 2019, investigative journalism organization Propublica reported on two US companies that claimed to fix companies’ ransomware data by decrypting it, while secretly paying ransomware companies behind the scenes to recover the data that way.

Since then, companies have openly advertised negotiation services, based on a willingness for cyber insurance companies to reimburse victims as part of their policy coverage. Ransomware demands have also ballooned as this form of cybercrime continues to gain traction.

Some have vowed not to pay ransoms. In 2019, a collection of mayors from across the US flipped the collective bird at ransomware thieves by adopting a joint non-payment resolution. More recently, some state legislators have passed laws to prevent government agencies from paying. And members of the International Counter-Ransomware Initiative, a global effort led by the US, has reportedly adopted a non-payment agreement.

However, these resolutions can only apply to government organizations. Many private companies do pay ransoms, coinciding with evolving approaches by ransomware attackers.

In the early days of this criminal model, ransomware operators would focus purely on encrypting data and demanding payment. Now, more of them steal the data as well, downloading it to their own computers and then threatening to embarrass the victim by publishing it. That likely encourages the victim to pay up, because even if they can decrypt the affected data on their own or restore it from their own backups, they’re still vulnerable to having their secrets leaked online.

The problem is that ransomware operators aren’t trustworthy. The #StopRansomware guide, authored by CISA, the NSA, and the FBI, warns that “paying ransom will not ensure your data is decrypted, that your systems or data will no longer be compromised, or that your data will not be leaked.” It might also put a victim on the wrong side of government sanctions, the document adds.

If companies must pay these ransoms, they’ll at least need a reliable partner to help them manage it. Every incident that draws that industry into disrepute is likely to damage that partnership, and perhaps lead more companies to wonder whether they should pay at all. Perhaps that wouldn’t be a bad thing.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Free certificates for IP addresses: security problem or solution?

Let’s Encrypt has announced its issued its first certificate for an IP address. Why that’s significant deserves a little explanation.

You may have run into Let’s Encrypt certificates many times without realizing it. When you see a padlock icon in your browser’s address bar, it means the site is using a certificate to secure your connection. These certificates are “digital passports” that websites use to prove their identity and to encrypt the data sent between your browser and the website.

Traditionally, these certificates have only been issued for domain names (like malwarebytes.com). Now, Let’s Encrypt has started issuing certificates for IP addresses, which are the numerical labels (like 192.0.66.233) that computers use to find each other on the internet.

Let’s Encrypt is a very popular provider of certificates, and you can find its certificates on hundreds of millions of websites. That’s because:

  • Let’s Encrypt certificates are free.
  • Hosting companies and content delivery networks often provide Let’s Encrypt by default as a service to their customers.
  • Let’s Encrypt is a mission-driven nonprofit aiming to make the web safer and more private for everyone.

The advantages of providing certificates for IP addresses are clear. Since some browsers will refuse to open sites without a certificate, it provides a safer way to access your website if you don’t have a domain name at all. It also allows you to use your browser to remotely access home devices like network-attached storage (NAS) servers and Internet-of-things (IoT) devices.

But most home users are unlikely to access a site by using the IP address. Domain names are much easier to remember (most of them anyway) and Domain Name System (DNS) translates domain names to IP addresses for us without a lot of problems.

And while IP addresses can change, DNS will make sure that our browser can still find the domain we want to visit. This is one reason why Let’s Encrypt will only issue short-term certificates for IP addresses: The certificates will be valid for just six days, a move designed to minimize the risk window in the event of a key compromise and to encourage automated certificate renewal practices.

Domain certificates can be compromised and abused. For example, in 2011, DigiNotar, a Dutch certificate authority, was breached, resulting in the issue of at least 500 fraudulent certificates for high-profile domains such as Gmail, Facebook, and the CIA.

And while you may have never heard of this breach, it spurred some much-needed improvements in the security of our online trust infrastructure.

Here’s the problem

If I post a URL online or send it by email, there is a visible part and a part that’s actually where you will be taken. For example <a href="https://malwarebytes.com/blog">example.com</a> will not take you to the displayed example.com, but to our blog’s landing page.

But let’s say that a cybercriminal can get a free certificate for the IP address of a server under their control, they could construct links that look like this <a href=”the server IP address”>payment provider X</a>. Should you click that link, you could end up on a specially crafted copy of the payment provider’s site set up by the cybercriminal which asks for your login credentials. Those credentials would then fall in the hands of the criminals if you entered them.

For an unsuspecting user, who potentially might have noticed the wrong domain in the address bar, an IP address might not raise any red flags, especially since they’ll see the padlock and assume it’s legitimate. But encrypted traffic doesn’t make it trustworthy. It is encrypted between the user and the website, so the receiver can read the credentials the visitor sent them.

At the same time, Let’s Encrypt’s move supports legitimate technical needs for IP-based certificates, so the challenge will be balancing security with accessibility. Defenders should monitor certificate transparency logs for suspicious IP certificates and combine this with other threat intelligence to identify abuse.

In essence, this new capability is a double-edged sword, both offering convenience and security benefits, but also new opportunities for cybercriminals.

Tips for users

The tips are basically the same as for any unsolicited link you encounter. The difference is that you should keep in mind that these URLs can now include IP addresses.

  • Don’t click on links in unsolicited emails, messages or on social media.
  • Hover over the link. A mismatch between the displayed domain and the target URL is a red flag.
  • The padlock does not mean the website is safe. It just means the traffic between you and the site is encrypted, so nobody in between can eavesdrop.
  • Enable multi-factor authentication (MFA) so criminals will not have access to your accounts with the credentials alone.
  • Keep your device and the software on it up to date, especially your security software and your browser.
  • Use a security solution that provides active protection, including against malicious domains and IPs.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Gamers hacked playing Call of Duty: WWII—PC version temporarily taken offline

On Saturday, the Call of Duty team announced that the PC version of Call of Duty: WWII has been taken offline following “reports of an issue.”

That issue seems to be a serious security problem, after reports surfaced about a remote code execution (RCE) vulnerability in the game.

After Microsoft’s acquisition of Activision in 2023, Activision’s headline title, Call of Duty, has been slowly making its way over to Xbox and PC Game Pass.

But only days after the 2017 Call of Duty: WWII arrived on Microsoft’s subscription service, the concerning reports started coming in. Players were using an RCE exploit to take over other players’ PCs during live multiplayer matches.

RCE is the name for a critical security flaw that allows attackers to run malicious code on a victim’s machine without their consent or physical access. Exploiting an RCE could lead to data breaches, taking control of systems, and installing malware. In this case, it seems as though attackers were using the RCE vulnerability to gain remote access to other players’ computers during games. They reportedly:

  • Opened command prompts on victims’ PCs
  • Sent mocking messages via Notepad
  • Forced remote shutdowns of players’ computers
  • Changed desktop wallpapers to display gay porn

Game Pass is a subscription service offered by Microsoft Gaming. Because consoles generally don’t allow this level of code execution, it’s only Windows PC gamers that were affected by this.

The hacking of older titles is an open-air secret among the Call of Duty community, with players often avoiding the games on Steam. The problem likely lies in the fact that the multi-player game relies on peer-to-peer (P2P) networking which means that one player’s machine acts as the match’s server.

There is a lot of speculation about Activision working to update the game’s anti-cheat systems called “Ricochet” as the title is seemingly rampant with abusers. But whether and how this update will fix the RCE vulnerability is a big unknown. We’ll keep you updated.

What gamers should do

This vulnerability is particularly alarming because it not only allows hackers to disrupt gameplay, it has the potential to compromise gamers’ entire PCs remotely.

This story shows how even established titles can put your machine at risk. While it’s unclear if the Steam version is impacted, these are the things to do:


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

A week in security (June 30 – July 6)

Last week on Malwarebytes Labs:

Last week on ThreatDown:

Stay safe!


Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

Drug cartel hacked cameras and phones to spy on FBI and identify witnesses

The “El Chapo” Mexican drug cartel snooped on FBI personnel through hacked cameras, and listened in on their phone calls to identify and kill potential witnesses, the US Department of Justice has said. And seven years on, the Bureau’s defenses against this kind of surveillance are still inadequate.

The findings came to light in a June 2025 report from the DoJ’s Inspector General. It identifies a threat that it calls ubiquitous technical surveillance (UTS), in which an attacker combines different kinds of data to build up a detailed profile of a subject. This links the subject to event, locations, and things.

The report highlights several ways in which bad actors can snoop on the FBI:

  • Visual and physical imagery (for example, photographing people)
  • Interception of electronic signals like phone calls
  • Analysis of financial transaction data
  • Checking travel bookings
  • Monitoring their online presence

“Some within the FBI and partner agencies, such as the Central Intelligence agency (CIA), have described this threat as ‘existential’,” warned the report.

The document details just how damaging this type of surveillance can be. It explains that the Sinaloa drug cartel, operated by infamous drug lord Joaquín “El Chapo” Guzmán, had hired a black hat operator to target the FBI. The criminal offered “a menu of services related to exploiting mobile phones and other electronic devices”, said an informant who told the Bureau about it in 2018.

The black hat spied on people entering and leaving the US Embassy in Mexico City and identified people that the cartel would be interested in. These included the FBI Assistant Legal Attache (ALAT), the report explained. The document continues:

“Using the ALAT’s phone number the hacker was able to see calls made and received, as well as obtain the ALAT’s geolocation data. According to the FBI, in addition to compromising the ALAT’s phone, the hacker also accessed Mexico City’s camera system, used the cameras to follow the ALAT through the city, and identified people the ALAT met with. According to the case agent, the cartel used that information to intimidate and/or kill potential sources or cooperating witnesses.”

Much work still to do

Drug cartels are powerful organizations and it’s a scary thought that they’d be able to infiltrate an institution as hardened as the FBI. But the Bureau must surely have this in hand, right?

Not so fast. The Inspector General had already found some worrying shortcomings in the Bureau’s defenses against UTS, warning the FBI that it was “disjointed and inconsistent” in 2022. The Bureau responded by classifying UTS as a Tier 1 Enterprise Risk that year. It recruited a ‘red team’ of analysts to identify UTS vulnerabilities and suggest mitigating measures, but the gap analysis the team submitted was a single-page nothingburger, per the Inspector General’s report, and not adequate to protect the Bureau. It only covered three of six expected vulnerability categories.

The red team had been given a prior far more detailed analysis called ‘Anatomy of a Case’ by the Bureau’s Counterintelligence Division but didn’t include these findings. The FBI later said that this was just an outline and is now going back over the two documents.

The Bureau has also proposed a strategic plan to handle UTS, but an early outline of that strategy doesn’t identify who has the authority to run it. “We are also concerned that the forthcoming strategy will not adequately create clear lines of authority when the FBI must respond to UTS-related security incidents,” the report said, adding that the plan’s measures “do not provide a sufficiently clear, actionable long-term approach to address the UTS threat.”

The US had captured and imprisoned Guzmán several times but he kept escaping. Authorities recaptured him in 2016 and extradited him to the US the following year. He was sentenced to life imprisonment in 2019.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

Catwatchful “child monitoring” app exposes victims’ data

If an app markets itself as being for “child monitoring”, a customer might expect that their data and those of the person you’re monitoring is handled with the utmost care and respect. However, as we’ve seen many times before, stalkerware (which is what monitoring software is known as) apps have a tendency to be low quality and lack security.

Stalkerware refers to apps and other monitoring software that enable someone to secretly spy on another person’s private life via their mobile device or computer. Many stalkerware apps market themselves as parental monitoring tools, but they can be—and often are—used to stalk and spy on a person. Sadly, the most common users of stalkerware are domestic violence abusers, who load these programs onto their partner’s device without their knowledge.

To prove our point about lacking security, researcher Eric Daigle found that an Android app called Catwatchful has exposed the data of thousands of its customers, along with its administrator.

Catwatchful claims it is “invisible and cannot be detected”, and uploads the victim’s photos, messages, and real-time location data to a dashboard for the person monitoring to see. It also can remotely tap into audio recorded by the phone’s microphone, as well as access both front and rear phone cameras.

Make no mistake, this is nasty stuff.

And now it turns out that the data hasn’t been stored securely. The exposed database, which the researcher shared with TechCrunch, contained the phone data from 26,000 victims’ devices as well as the email addresses and plain text passwords of more than 62,000 customers.

Stalkerware apps continue to pose a serious threat to privacy and security. Over the past years, several cases have revealed how these apps not only violate victims’ privacy but also expose sensitive data due to poor security practices. Recent leaks revealed that apps like Spyzie, Cocospy, and Spyic exposed millions of victims’ private information, including messages, photos, and locations. The attackers also obtained the email addresses of more than three million customers. Because the flaw was so easy to exploit, researchers kept the details under wraps to prevent further damage. After the breach, these apps disappeared from the internet, likely trying to avoid legal consequences rather than fixing security.

Another case involved Spyhide, where a security researcher uncovered a decade of surveillance on tens of thousands of Android devices. The app’s poorly secured backend let attackers access call logs, messages, and location data from tens of thousands of victims.

The infamous mSpy monitoring app has suffered multiple leaks, with millions of records including personal documents and monitored activity exposed. Even high-profile users were found among its customers. Despite repeated breaches, mSpy’s security remains weak, putting victims at ongoing risk.

These cases highlight a harsh reality: Stalkerware companies put profits before privacy, leaving victims and users vulnerable to further harm. As these apps operate in legal grey areas, it’s important to stay alert about the dangers they bring.

Considering using a monitoring app?

If you are thinking about installing such an app, and you are reading this:

  1. Don’t!
  2. Remember that using an app like this without the person’s permission is illegal in almost every country, unless it’s done with consent of the government itself.
  3. We have never heard of anyone who was able to solve a problem by using stalkerware. Usually resorting to stalkerware only makes it worse.
  4. Consider the consequences of the person finding out what you did. The lack of security and repeated breaches of these apps demonstrate that it is a distinct possibility.
  5. Listen to this podcast.

Malwarebytes, as one of the founding members of the Coalition Against Stalkerware makes it a priority to detect and remove stalkerware from your device. It is good to keep in mind however that by removing the stalkerware you will alert the person spying on you that you know the app is there.

Check your exposure

Unfortunately, breaches are an everyday occurrence. If you want to see how much of your personal data has been exposed online, Malwarebytes has a free tool that you can use to check. Submit your email address (it’s best to give the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report and recommendations.

If you are looking for a way to remove stalkerware from your device, Malwarebytes Premium Security and Malwarebytes Mobile Security can help.

Microsoft, PayPal, DocuSign, and Geek Squad faked in callback phishing scams

Microsoft, DocuSign, Adobe, McAfee, NortonLifeLock, PayPal, and Best Buy’s Geek Squad are being impersonated online through malicious emails that contain fake telephone support numbers and dangerous QR codes that can ensnare victims into phishing scams.

The brands and their products are frequently relied upon for everyday administration, like sending emails, obtaining signatures, viewing documents, receiving payments, and even getting tech help, emphasizing the threat these phishing campaigns have to small business owners and their shops.

This latest suite of phishing attacks was observed by researchers at Cisco Talos, who discovered that, between May and June, the most impersonated brands for emails containing PDF attachments, in order, were:

  1. Microsoft
  2. NortonLifeLock
  3. PayPal
  4. DocuSign
  5. Geek Squad

The attacks involve a careful blend of technical evasion and social engineering to arrive in people’s inboxes and to send those people on a dangerous path—online or over the phone—into eventually handing over important login credentials or even downloading malware directly onto their computers.

The emails themselves, according to Talos researchers, often avoid phishing detection because the email bodies are blank. Without any text to review, phishing detection engines that rely strictly on text become somewhat useless.

But the cybercriminals in these attacks still have to trick targets with their emails, so they instead attach PDFs to those emails that are cleverly structured to automatically load when a person opens just the email, not the attachment. What the targets see, then, is nearly indecipherable from a regular email: a convincing company logo, a paragraph or two about an urgent need, and a telephone number, link, or QR code that the reader can follow to “fix” the issue.

One fraudulent email from “Microsoft” teased a potential raise with more information behind a QR code, another claimed to arrive from “Adobe” containing a file from “Human Resources,” two emails—one from “McAfee,” another from “PayPal”—included fake invoices for hundreds of dollars, and one falsely claimed that a target had a set of downloads to access through “Dropbox.”

As witnessed by the security researchers, many of the emails in these phishing campaigns are part of a broader type of attack called “telephone-oriented attack delivery” or, more simply, “callback phishing.” In these types of attacks, targets are tricked into taking their conversations to an entirely separate medium—the phone—where they can be preyed upon further, the researchers said.

“Victims are instructed to call a specific number in the PDF to resolve an issue or confirm a transaction. Once the victim calls, the attacker poses as a legitimate representative and attempts to manipulate them into disclosing confidential information or installing malicious software on their computer.”

Researchers also discovered emails that contained malicious QR codes that, if scanned by victims, would send them to a separate phishing website. The phishing sites, themselves, also impersonate brands, as researchers found fake login pages for Microsoft and Dropbox.

How to stay safe from phishing

Though the callback phishing scams discovered by cybersecurity researchers involved clever techniques to make sure they reached people’s email inboxes, the rules of phishing detection still apply for everyday businesses. Here are the clear signs of a phishing scam (some of which were present in the callback phishing emails above):

  • The email invokes urgency, fear, or confusion. Scammers trick people into clicking on dangerous links or calling unknown numbers because a bigger (fake) problem needs to be addressed immediately. Slow down before taking action.
  • The email includes attachments. It is extraordinarily rare to receive an attachment in an email from a company that you merely do business with. Don’t trust any attachment from someone you don’t personally know.
  • The email comes from an unknown sender. Even if the email looks like it has arrived from a major company or a known contact, the email address itself can be spoofed—and sometimes through rather lazy attempts, like replacing letters with numbers or adding a period in the address that shouldn’t be there.
  • The email includes a QR code. QR codes can easily hide malicious links. Be wary around any you find inside emails.

It’s important to be able to detect phishing scams on your own, but mistakes happen everywhere, everyday. That’s why the best protection requires an active antimalware solution with web protection.

Qantas: Breach affects 6 million people, “significant” amount of data likely taken

Australia’s largest airline Qantas has confirmed that cybercriminals have gained access to a third party customer servicing platform that contained 6 million customer service records.

Qantas says the breach occurred after a cybercriminal targeted a call centre and managed to gain access to the third party platform, presumably via social engineering.

The airline reassured customers by saying all Qantas systems remain secure, and that there would be “no impact to Qantas’ operations or the safety of the airline. However, Qantas anticipates that a large amount of data has been taken:

“We are continuing to investigate the proportion of the data that has been stolen, though we expect it will be significant.”

An initial review has confirmed the data includes:

  • Customers’ names
  • Email addresses
  • Phone numbers
  • Birth dates
  • Frequent flyer numbers

Fortunately, credit card details, personal financial information and passport details were not held in the breached system.

The airline responded quickly by isolating the affected system, notifying customers, and working with the Australian Cyber Security Centre, the Australian Federal Police, and independent cybersecurity experts.

The breach at a third party provider is extra painful since Qantas concluded an uplift of third and fourth-party cyber-risk governance processes in 2024. In a report released at the time, the airline explained:

“Third- and fourth-party cyber risk involves managing cyber risks from our direct suppliers (third parties) and their suppliers (fourth parties), who can affect our supply chain directly or indirectly through cyber incidents.”

No group has claimed responsibility for the cyberattack yet, which is normal if it is a ransomware attack. But it’s noteable that this weekend the FBI put out a warning on social media about ransomware attacks targeting airlines.

FBI warning on social media

“The FBI has recently observed the cybercriminal group Scattered Spider expanding its targeting to include the airline sector. These actors rely on social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access. These techniques frequently involve methods to bypass multi-factor authentication (MFA), such as convincing help desk services to add unauthorized MFA devices to compromised accounts. They target large corporations and their third-party IT providers, which means anyone in the airline ecosystem, including trusted vendors and contractors, could be at risk.

Once inside, Scattered Spider actors steal sensitive data for extortion and often deploy ransomware. The FBI is actively working with aviation and industry partners to address this activity and assist victims. Early reporting allows the FBI to engage promptly, share intelligence across the industry, and prevent further compromise. If you suspect your organization has been targeted, please contact your local FBI office.”

Qantas has set up a dedicated customer support line as well as a web page to provide the latest information to customers. Qantas says it will also continue to update customers via its social channels.

Protecting yourself after a data breach

There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.

  • Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened and follow any specific advice they offer.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
  • Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims and verify the identity of anyone who contacts you using a different communication channel.
  • Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
  • Consider not storing your card details. It’s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.
  • Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.

We don’t just report on threats – we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection.

Update your Chrome to fix new actively exploited zero-day vulnerability

Google has released an update for its Chrome browser to patch an actively exploited flaw.

This update is crucial since it addresses an actively exploited vulnerability which can be exploited when the user visits a malicious website. It doesn’t require any further user interaction, which means the user doesn’t need to click on anything in order for their system to be compromised.

The update brings the Stable channel to 138.0.7204.96/.97 for Windows, 138.0.7204.92/.93 for Mac and 138.0.7204.96 for Linux.

The easiest way to update Chrome is to allow it to update automatically, but you can end up lagging behind if you never close your browser or if something goes wrong—such as an extension stopping you from updating the browser.

To manually get the update, click the more menu (three stacked dots), then choose Settings > About Chrome. If there is an update available, Chrome will notify you and start downloading it. Then all you have to do is reload Chrome in order for the update to complete, and for you to be safe from the vulnerability.

Nearly up to date. Just Relaunch.

You can find more elaborate update instructions and the version number information in our article on how to update Chrome on every operating system.

Technical details on the vulnerability

The vulnerability, tracked as CVE-2025-6554 is a type confusion in V8 in Google Chrome that, prior to 138.0.7204.96, could have allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.

A type confusion bug happens when code doesn’t verify the object type passed to it, and then uses the object without type-checking. Unfortunately, this bug occurs on the V8 JavaScript engine, Google’s open-source JavaScript engine.

The browser mistakenly treats a piece of data as the wrong type, which lets attackers manipulate memory in unintended ways. This can allow them to perform unauthorized read and write operations in the browser’s memory.

Clément Lecigne of Google’s Threat Analysis Group (TAG) has been credited with discovering and reporting the flaw on June 25, 2025. The TAG group focuses on spyware and nation-state attackers who abuse zero days for espionage purposes.


We don’t just report on browser vulnerabilities, Malwarebytes’ Browser Guard protects your browser against malicious websites and credit card skimmers, blocks unwanted ads, and warns you about relevant data breaches and scams.