China-Linked Hackers Lay Brickstorm Backdoors on Euro Networks https://t.co/4vkXu2MtLK
Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler https://t.co/PKwSQujfIp
Multiple Groups Exploit NTLM Flaw in Microsoft Windows: https://t.co/xmh8V0niuE by darkreading #infosec #cybersecurity #technology #news
Security researchers have identified a new variant of the BRICKSTORM malware targeting Windows systems, raising concerns about Chinese-backed espionage activities focused on European businesses. The BRICKSTORM backdoor has been deployed by China-linked hacker groups to infiltrate networks across Europe. In addition to BRICKSTORM, multiple privilege escalation vulnerabilities have been discovered in Microsoft Windows components. Notably, four new local privilege escalation flaws were found in the Windows Task Scheduler executable (schtasks.exe), allowing attackers to bypass User Account Control (UAC), execute SYSTEM-level commands, erase security logs, and impersonate administrators using known passwords. These vulnerabilities currently lack available fixes. Other critical flaws include CVE-2025-24076 and CVE-2025-24994 affecting Windows 11, as well as an active NTLM exploit identified as CVE-2025-24054, which is being exploited by multiple threat actors. Meanwhile, the ransomware gang CrazyHunter has been reported targeting critical organizations in Taiwan, further highlighting the evolving cybersecurity threats in the region. Additional concerns have been raised about cloud and cryptography weaknesses in mobile applications that risk leaking enterprise data.