Security Highlights Of The Day [21/10/25]
TikTok Videos Continue to Push Infostealers in ClickFix Attacks
Cybercriminals are using TikTok videos disguised as free activation guides for popular software (Windows, Spotify, Netflix, Microsoft 365, Adobe, CapCut Pro, Discord Nitro and others) to spread information-stealing malware. The videos perform ClickFix attacks — social-engineering “fixes” that trick users into executing malicious PowerShell commands or other scripts that infect their machines with infostealers.
Source: BleepingComputer
—
Google Ads for Fake Homebrew, LogMeIn Sites Push Infostealers
A malicious campaign targets macOS developers with fake Homebrew, LogMeIn and TradingView sites promoted via ads to deliver infostealers such as AMOS (Atomic macOS Stealer) and Odyssey. The campaign uses ClickFix techniques to trick targets into running commands in Terminal, causing them to self-install malware.
Source: BleepingComputer
—
131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign
Researchers uncovered a coordinated campaign using 131 rebranded clones of a WhatsApp Web automation Chrome extension to spam Brazilian users at scale. The extensions share code, design patterns, and infrastructure, collectively serving ~20,905 active users and automating bulk outreach to bypass WhatsApp’s anti-spam controls.
Source: TheHackerNews
—
Amazon’s AWS Recovering After Major Outage Disrupts Apps, Services Worldwide
Amazon Web Services reported recovery after a widespread outage that knocked out thousands of websites and disrupted major apps (including Snapchat and Reddit), causing global service interruptions. Systems began returning online after roughly three hours, with AWS reporting significant signs of recovery while working through a backlog of queued requests.
Source: Reuters
—
Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack
Researchers linked an intrusion to China-based group Salt Typhoon (aka Earth Estries/GhostEmperor/UNC2286) that exploited a Citrix NetScaler Gateway vulnerability, using DLL sideloading and zero-day techniques to infiltrate systems. The group has targeted critical sectors (telecom, energy, government) across 80+ countries, employing advanced tactics to evade detection.
Source: Infosecurity Magazine