Toggle light / dark theme

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver tracked as CVE-2025–31324, indicating that multiple threat actors are taking advantage of the bug.

Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and the RansomExx ransomware family, which is traced by Microsoft under the moniker Storm-2460.

BianLian is assessed to be involved in at least one incident based on infrastructure links to IP addresses previously identified as attributed to the e-crime group.

Then last year, Trustwave SpiderLabs revealed details of another phishing campaign targeting the same region with malicious payloads which it said exhibits similarities with that of Horabot malware.

The latest set of attacks starts with a phishing email that employs invoice-themed lures to entice users into opening a ZIP archive containing a PDF document. However, in reality, the attached ZIP file contains a malicious HTML file with Base64-encoded HTML data that’s designed to reach out to a remote server and download the next-stage payload.

“Attackers can exploit the flaw via a malicious web page or script that causes the scripting engine to misinterpret object types, resulting in memory corruption and arbitrary code execution in the context of the current user. If the user has administrative privileges, attackers could gain full system control – enabling data theft, malware installation, and lateral movement across networks.”

CVE-2025–30400 is the third privilege escalation flaw in DWM Core Library to be weaponized in the wild since 2023. In May 2024, Microsoft issued patches for CVE-2024–30051, which Kaspersky said was used in attacks distributing QakBot (aka Qwaking Mantis) malware.

“Since 2022, Patch Tuesday has addressed 26 elevation of privilege vulnerabilities in DWM,” Satnam Narang, senior staff research engineer at Tenable, said in a statement shared with The Hacker News.

In geometry, the is the convex regular 4-polytope (four-dimensional analogue of a Platonic solid) with Schläfli symbol {3,3,5}. It is also known as the C600, hexacosichoron [ 1 ] and hexacosihedroid. [ 2 ] It is also called a tetraplex (abbreviated from “tetrahedral complex”) and a polytetrahedron, being bounded by tetrahedral cells.

The boundary is composed of 600 tetrahedral cells with 20 meeting at each vertex. Together they form 1,200 triangular faces, 720 edges, and 120 vertices. It is the 4-dimensional analogue of the icosahedron, since it has five tetrahedra meeting at every edge, just as the icosahedron has five triangles meeting at every vertex. Its dual polytope is the 120-cell.

Ribonucleic acid, also called RNA, is a molecule present in all living cells. It plays a critical role in transmitting genetic instructions from DNA and creating proteins. With the power to execute a plethora of functions, the little RNA “messenger” has led to important innovations across therapeutics, diagnostics, and vaccines, and made us rethink our understanding of life itself.

A team of researchers from Boston University’s Biological Design Center and the Department of Biomedical Engineering recently made significant steps forward in the development of the next generation of computational RNA tools. They recently published a study in Nature Communications describing a generative AI technique for designing different types of RNA molecules with improved function.

Much like a that can be used to compose entirely new texts, the model can compose new RNA sequences tailored for specific tasks in the cell or in a diagnostic assay. Their research has shown that it’s possible to predict and generate RNA sequences that have specific functions across a broad array of potential applications.